SUSE update for the Linux Kernel



| Updated: 2024-12-04
Risk Low
Patch available YES
Number of vulnerabilities 393
CVE-ID CVE-2023-52489
CVE-2023-52581
CVE-2023-52668
CVE-2023-52688
CVE-2023-52756
CVE-2023-52766
CVE-2023-52800
CVE-2023-52802
CVE-2023-52859
CVE-2023-52885
CVE-2023-52886
CVE-2023-52887
CVE-2023-52889
CVE-2024-26590
CVE-2024-26631
CVE-2024-26637
CVE-2024-26668
CVE-2024-26669
CVE-2024-26677
CVE-2024-26682
CVE-2024-26683
CVE-2024-26735
CVE-2024-26758
CVE-2024-26767
CVE-2024-26808
CVE-2024-26809
CVE-2024-26812
CVE-2024-26835
CVE-2024-26837
CVE-2024-26849
CVE-2024-26851
CVE-2024-26889
CVE-2024-26920
CVE-2024-26976
CVE-2024-27010
CVE-2024-27011
CVE-2024-27024
CVE-2024-27049
CVE-2024-27050
CVE-2024-27079
CVE-2024-27403
CVE-2024-27433
CVE-2024-27437
CVE-2024-31076
CVE-2024-35855
CVE-2024-35897
CVE-2024-35902
CVE-2024-35913
CVE-2024-35939
CVE-2024-35949
CVE-2024-36270
CVE-2024-36286
CVE-2024-36288
CVE-2024-36489
CVE-2024-36881
CVE-2024-36907
CVE-2024-36929
CVE-2024-36933
CVE-2024-36939
CVE-2024-36970
CVE-2024-36979
CVE-2024-38548
CVE-2024-38563
CVE-2024-38609
CVE-2024-38662
CVE-2024-39476
CVE-2024-39483
CVE-2024-39484
CVE-2024-39486
CVE-2024-39488
CVE-2024-39489
CVE-2024-39491
CVE-2024-39493
CVE-2024-39497
CVE-2024-39499
CVE-2024-39500
CVE-2024-39501
CVE-2024-39505
CVE-2024-39506
CVE-2024-39508
CVE-2024-39509
CVE-2024-39510
CVE-2024-40899
CVE-2024-40900
CVE-2024-40902
CVE-2024-40903
CVE-2024-40904
CVE-2024-40905
CVE-2024-40909
CVE-2024-40910
CVE-2024-40911
CVE-2024-40912
CVE-2024-40913
CVE-2024-40916
CVE-2024-40920
CVE-2024-40921
CVE-2024-40922
CVE-2024-40924
CVE-2024-40926
CVE-2024-40927
CVE-2024-40929
CVE-2024-40930
CVE-2024-40932
CVE-2024-40934
CVE-2024-40936
CVE-2024-40938
CVE-2024-40939
CVE-2024-40941
CVE-2024-40942
CVE-2024-40943
CVE-2024-40944
CVE-2024-40945
CVE-2024-40954
CVE-2024-40956
CVE-2024-40957
CVE-2024-40958
CVE-2024-40959
CVE-2024-40962
CVE-2024-40964
CVE-2024-40967
CVE-2024-40976
CVE-2024-40977
CVE-2024-40978
CVE-2024-40981
CVE-2024-40982
CVE-2024-40984
CVE-2024-40987
CVE-2024-40988
CVE-2024-40989
CVE-2024-40990
CVE-2024-40992
CVE-2024-40994
CVE-2024-40995
CVE-2024-40997
CVE-2024-41000
CVE-2024-41001
CVE-2024-41002
CVE-2024-41004
CVE-2024-41007
CVE-2024-41009
CVE-2024-41010
CVE-2024-41011
CVE-2024-41012
CVE-2024-41015
CVE-2024-41016
CVE-2024-41020
CVE-2024-41022
CVE-2024-41024
CVE-2024-41025
CVE-2024-41028
CVE-2024-41032
CVE-2024-41035
CVE-2024-41036
CVE-2024-41037
CVE-2024-41038
CVE-2024-41039
CVE-2024-41040
CVE-2024-41041
CVE-2024-41044
CVE-2024-41045
CVE-2024-41048
CVE-2024-41049
CVE-2024-41050
CVE-2024-41051
CVE-2024-41056
CVE-2024-41057
CVE-2024-41058
CVE-2024-41059
CVE-2024-41060
CVE-2024-41061
CVE-2024-41062
CVE-2024-41063
CVE-2024-41064
CVE-2024-41065
CVE-2024-41066
CVE-2024-41068
CVE-2024-41069
CVE-2024-41070
CVE-2024-41071
CVE-2024-41072
CVE-2024-41073
CVE-2024-41074
CVE-2024-41075
CVE-2024-41076
CVE-2024-41078
CVE-2024-41079
CVE-2024-41080
CVE-2024-41081
CVE-2024-41084
CVE-2024-41087
CVE-2024-41088
CVE-2024-41089
CVE-2024-41092
CVE-2024-41093
CVE-2024-41094
CVE-2024-41095
CVE-2024-41096
CVE-2024-41097
CVE-2024-41098
CVE-2024-42064
CVE-2024-42069
CVE-2024-42070
CVE-2024-42073
CVE-2024-42074
CVE-2024-42076
CVE-2024-42077
CVE-2024-42079
CVE-2024-42080
CVE-2024-42082
CVE-2024-42085
CVE-2024-42086
CVE-2024-42087
CVE-2024-42089
CVE-2024-42090
CVE-2024-42092
CVE-2024-42093
CVE-2024-42095
CVE-2024-42096
CVE-2024-42097
CVE-2024-42098
CVE-2024-42101
CVE-2024-42104
CVE-2024-42105
CVE-2024-42106
CVE-2024-42107
CVE-2024-42109
CVE-2024-42110
CVE-2024-42113
CVE-2024-42114
CVE-2024-42115
CVE-2024-42117
CVE-2024-42119
CVE-2024-42120
CVE-2024-42121
CVE-2024-42122
CVE-2024-42124
CVE-2024-42125
CVE-2024-42126
CVE-2024-42127
CVE-2024-42130
CVE-2024-42131
CVE-2024-42132
CVE-2024-42133
CVE-2024-42136
CVE-2024-42137
CVE-2024-42138
CVE-2024-42139
CVE-2024-42141
CVE-2024-42142
CVE-2024-42143
CVE-2024-42144
CVE-2024-42145
CVE-2024-42147
CVE-2024-42148
CVE-2024-42152
CVE-2024-42153
CVE-2024-42155
CVE-2024-42156
CVE-2024-42157
CVE-2024-42158
CVE-2024-42159
CVE-2024-42161
CVE-2024-42162
CVE-2024-42223
CVE-2024-42224
CVE-2024-42225
CVE-2024-42226
CVE-2024-42227
CVE-2024-42228
CVE-2024-42229
CVE-2024-42230
CVE-2024-42232
CVE-2024-42236
CVE-2024-42237
CVE-2024-42238
CVE-2024-42239
CVE-2024-42240
CVE-2024-42241
CVE-2024-42244
CVE-2024-42245
CVE-2024-42246
CVE-2024-42247
CVE-2024-42250
CVE-2024-42253
CVE-2024-42259
CVE-2024-42268
CVE-2024-42269
CVE-2024-42270
CVE-2024-42271
CVE-2024-42274
CVE-2024-42276
CVE-2024-42277
CVE-2024-42278
CVE-2024-42279
CVE-2024-42280
CVE-2024-42281
CVE-2024-42283
CVE-2024-42284
CVE-2024-42285
CVE-2024-42286
CVE-2024-42287
CVE-2024-42288
CVE-2024-42289
CVE-2024-42290
CVE-2024-42291
CVE-2024-42292
CVE-2024-42295
CVE-2024-42298
CVE-2024-42301
CVE-2024-42302
CVE-2024-42303
CVE-2024-42308
CVE-2024-42309
CVE-2024-42310
CVE-2024-42311
CVE-2024-42312
CVE-2024-42313
CVE-2024-42314
CVE-2024-42315
CVE-2024-42316
CVE-2024-42318
CVE-2024-42319
CVE-2024-42320
CVE-2024-42322
CVE-2024-43816
CVE-2024-43817
CVE-2024-43818
CVE-2024-43819
CVE-2024-43821
CVE-2024-43823
CVE-2024-43824
CVE-2024-43825
CVE-2024-43826
CVE-2024-43829
CVE-2024-43830
CVE-2024-43831
CVE-2024-43833
CVE-2024-43834
CVE-2024-43837
CVE-2024-43839
CVE-2024-43840
CVE-2024-43841
CVE-2024-43842
CVE-2024-43846
CVE-2024-43847
CVE-2024-43849
CVE-2024-43850
CVE-2024-43851
CVE-2024-43853
CVE-2024-43854
CVE-2024-43855
CVE-2024-43856
CVE-2024-43858
CVE-2024-43860
CVE-2024-43861
CVE-2024-43863
CVE-2024-43864
CVE-2024-43866
CVE-2024-43867
CVE-2024-43871
CVE-2024-43872
CVE-2024-43873
CVE-2024-43874
CVE-2024-43875
CVE-2024-43876
CVE-2024-43877
CVE-2024-43879
CVE-2024-43880
CVE-2024-43881
CVE-2024-43882
CVE-2024-43883
CVE-2024-43884
CVE-2024-43885
CVE-2024-43889
CVE-2024-43892
CVE-2024-43893
CVE-2024-43894
CVE-2024-43895
CVE-2024-43897
CVE-2024-43899
CVE-2024-43900
CVE-2024-43902
CVE-2024-43903
CVE-2024-43905
CVE-2024-43906
CVE-2024-43907
CVE-2024-43908
CVE-2024-43909
CVE-2024-43911
CVE-2024-43912
CVE-2024-44931
CVE-2024-44938
CVE-2024-44939
CWE-ID CWE-362
CWE-401
CWE-667
CWE-119
CWE-125
CWE-416
CWE-476
CWE-388
CWE-366
CWE-20
CWE-190
CWE-399
CWE-835
CWE-825
CWE-404
CWE-908
CWE-191
CWE-415
CWE-200
CWE-843
CWE-617
CWE-682
CWE-369
Exploitation vector Local
Public exploit N/A
Vulnerable software
SUSE Real Time Module
Operating systems & Components / Operating system

SUSE Linux Enterprise Live Patching
Operating systems & Components / Operating system

SUSE Linux Enterprise Real Time 15
Operating systems & Components / Operating system

openSUSE Leap
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15
Operating systems & Components / Operating system

kernel-livepatch-6_4_0-150600_10_8-rt
Operating systems & Components / Operating system package or component

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource
Operating systems & Components / Operating system package or component

kernel-rt_debug
Operating systems & Components / Operating system package or component

kernel-rt
Operating systems & Components / Operating system package or component

kernel-source-rt
Operating systems & Components / Operating system package or component

kernel-devel-rt
Operating systems & Components / Operating system package or component

kselftests-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-extra-debuginfo
Operating systems & Components / Operating system package or component

reiserfs-kmp-rt
Operating systems & Components / Operating system package or component

kernel-rt_debug-devel
Operating systems & Components / Operating system package or component

kernel-rt-devel-debuginfo
Operating systems & Components / Operating system package or component

reiserfs-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt_debug-devel-debuginfo
Operating systems & Components / Operating system package or component

gfs2-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-optional-debuginfo
Operating systems & Components / Operating system package or component

cluster-md-kmp-rt
Operating systems & Components / Operating system package or component

kernel-rt_debug-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-vdso
Operating systems & Components / Operating system package or component

kernel-syms-rt
Operating systems & Components / Operating system package or component

kernel-rt_debug-vdso-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-optional
Operating systems & Components / Operating system package or component

cluster-md-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

ocfs2-kmp-rt
Operating systems & Components / Operating system package or component

dlm-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-debugsource
Operating systems & Components / Operating system package or component

dlm-kmp-rt
Operating systems & Components / Operating system package or component

kernel-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-vdso-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt_debug-debugsource
Operating systems & Components / Operating system package or component

gfs2-kmp-rt
Operating systems & Components / Operating system package or component

kernel-rt-extra
Operating systems & Components / Operating system package or component

kernel-rt_debug-livepatch-devel
Operating systems & Components / Operating system package or component

ocfs2-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kselftests-kmp-rt
Operating systems & Components / Operating system package or component

kernel-rt-devel
Operating systems & Components / Operating system package or component

kernel-rt-livepatch-devel
Operating systems & Components / Operating system package or component

kernel-rt_debug-vdso
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 393 vulnerabilities.

1) Race condition

EUVDB-ID: #VU89388

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52489

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the section_deactivate() function in mm/sparse.c. A local user can exploit the race and escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Memory leak

EUVDB-ID: #VU89385

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52581

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform DoS attack on the target system.

The vulnerability exists due memory leak within the nft_trans_gc_space() function in net/netfilter/nf_tables_api.c. A local user can force the system to leak memory and perform denial of service attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper locking

EUVDB-ID: #VU91517

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52668

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the btrfs_zone_activate() function in fs/btrfs/zoned.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Buffer overflow

EUVDB-ID: #VU93803

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52688

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the ath12k_core_qmi_firmware_ready() function in drivers/net/wireless/ath/ath12k/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Buffer overflow

EUVDB-ID: #VU91307

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52756

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the include/linux/pwm.h. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Out-of-bounds read

EUVDB-ID: #VU91086

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52766

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the hci_dma_irq_handler() function in drivers/i3c/master/mipi-i3c-hci/dma.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Use-after-free

EUVDB-ID: #VU90071

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52800

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ath11k_htt_pktlog() function in drivers/net/wireless/ath/ath11k/dp_rx.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) NULL pointer dereference

EUVDB-ID: #VU90536

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52802

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the stm32_adc_probe() function in drivers/iio/adc/stm32-adc-core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Use-after-free

EUVDB-ID: #VU90081

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52859

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the hisi_sllc_pmu_probe() function in drivers/perf/hisilicon/hisi_uncore_sllc_pmu.c, within the hisi_pa_pmu_probe() function in drivers/perf/hisilicon/hisi_uncore_pa_pmu.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Use-after-free

EUVDB-ID: #VU94326

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52885

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the svc_tcp_listen_data_ready() function in net/sunrpc/svcsock.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Out-of-bounds read

EUVDB-ID: #VU94434

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52886

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the get_bMaxPacketSize0(), hub_port_init(), hub_port_connect() and usb_reset_and_verify_device() functions in drivers/usb/core/hub.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Improper error handling

EUVDB-ID: #VU95018

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52887

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the j1939_xtp_rx_rts_session_new() function in net/can/j1939/transport.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) NULL pointer dereference

EUVDB-ID: #VU96132

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52889

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the apparmor_socket_sock_rcv_skb() function in security/apparmor/lsm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) NULL pointer dereference

EUVDB-ID: #VU90663

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26590

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the z_erofs_do_map_blocks() function in fs/erofs/zmap.c, within the z_erofs_parse_cfgs() function in fs/erofs/decompressor.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Race condition within a thread

EUVDB-ID: #VU91436

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26631

CWE-ID: CWE-366 - Race Condition within a Thread

Exploit availability: No

Description

The vulnerability allows a local user to manipulate data.

The vulnerability exists due to a data race within the ipv6_mc_down() function in net/ipv6/mcast.c. A local user can manipulate data.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Input validation error

EUVDB-ID: #VU93692

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26637

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ath11k_mac_op_add_interface() and ath11k_mac_txpower_recalc() functions in drivers/net/wireless/ath/ath11k/mac.c, within the ath11k_debugfs_add_interface() function in drivers/net/wireless/ath/ath11k/debugfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Integer overflow

EUVDB-ID: #VU91180

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26668

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the nft_limit_eval() and nft_limit_init() functions in net/netfilter/nft_limit.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Memory leak

EUVDB-ID: #VU90010

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26669

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the fl_tmplt_destroy() function in net/sched/cls_flower.c, within the tcf_block_playback_offloads() and tc_chain_tmplt_add() functions in net/sched/cls_api.c, within the void() function in include/net/sch_generic.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Input validation error

EUVDB-ID: #VU94139

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26677

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the rxrpc_propose_delay_ACK(), rxrpc_send_initial_ping() and rxrpc_input_call_event() functions in net/rxrpc/call_event.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Input validation error

EUVDB-ID: #VU94141

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26682

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ieee80211_mgd_csa_present(), ieee80211_mgd_auth() and ieee80211_mgd_assoc() functions in net/mac80211/mlme.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Input validation error

EUVDB-ID: #VU93177

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26683

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the cfg80211_update_hidden_bsses() and cfg80211_update_known_bss() functions in net/wireless/scan.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Use-after-free

EUVDB-ID: #VU90215

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26735

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the seg6_init() function in net/ipv6/seg6.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Resource management error

EUVDB-ID: #VU93873

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26758

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources in drivers/md/md.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Infinite loop

EUVDB-ID: #VU91415

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26767

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the link_validate_dpia_bandwidth() function in drivers/gpu/drm/amd/display/dc/link/link_validation.c, within the get_firmware_info_v3_2(), get_integrated_info_v11(), get_integrated_info_v2_1() and get_integrated_info_v2_2() functions in drivers/gpu/drm/amd/display/dc/bios/bios_parser2.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) Expired pointer dereference

EUVDB-ID: #VU93809

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26808

CWE-ID: CWE-825 - Expired pointer dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a stale reference within the nf_tables_netdev_event() function in net/netfilter/nft_chain_filter.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) Improper resource shutdown or release

EUVDB-ID: #VU93747

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26809

CWE-ID: CWE-404 - Improper Resource Shutdown or Release

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to failure to properly release resources within the nft_pipapo_destroy() function in net/netfilter/nft_set_pipapo.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

27) Improper locking

EUVDB-ID: #VU91529

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26812

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the vfio_send_intx_eventfd(), vfio_intx_handler() and vfio_pci_set_intx_trigger() functions in drivers/vfio/pci/vfio_pci_intrs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

28) Resource management error

EUVDB-ID: #VU93772

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26835

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the nf_tables_updtable() function in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

29) Improper locking

EUVDB-ID: #VU92039

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26837

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the switchdev_obj_eq() and switchdev_port_obj_del() functions in net/switchdev/switchdev.c, within the br_switchdev_mdb_replay_one() and br_switchdev_mdb_replay() functions in net/bridge/br_switchdev.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

30) Use of uninitialized resource

EUVDB-ID: #VU90875

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26849

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the sizeof() function in lib/nlattr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

31) Out-of-bounds read

EUVDB-ID: #VU91096

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26851

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the decode_seq() function in net/netfilter/nf_conntrack_h323_asn1.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

32) Buffer overflow

EUVDB-ID: #VU91312

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26889

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the hci_get_dev_info() function in net/bluetooth/hci_core.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

33) Buffer overflow

EUVDB-ID: #VU93805

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26920

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the register_snapshot_trigger() function in kernel/trace/trace_events_trigger.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

34) Improper locking

EUVDB-ID: #VU90774

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26976

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the async_pf_execute(), kvm_clear_async_pf_completion_queue(), kvm_check_async_pf_completion() and kvm_setup_async_pf() functions in virt/kvm/async_pf.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

35) Improper locking

EUVDB-ID: #VU90769

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27010

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the qdisc_alloc() function in net/sched/sch_generic.c, within the qdisc_run_end() function in net/core/dev.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

36) Memory leak

EUVDB-ID: #VU90463

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27011

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the nft_data_hold() and __nf_tables_abort() functions in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

37) Resource management error

EUVDB-ID: #VU93841

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27024

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the rds_sendmsg() function in net/rds/send.c, within the __rds_rdma_map() function in net/rds/rdma.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

38) Use-after-free

EUVDB-ID: #VU90179

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27049

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mt7925_pci_remove() function in drivers/net/wireless/mediatek/mt76/mt7925/pci.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

39) Out-of-bounds read

EUVDB-ID: #VU91094

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27050

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the bpf_xdp_query() function in tools/lib/bpf/netlink.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

40) NULL pointer dereference

EUVDB-ID: #VU90518

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27079

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the intel_pasid_setup_nested() function in drivers/iommu/intel/pasid.c, within the domain_context_clear() and intel_iommu_release_device() functions in drivers/iommu/intel/iommu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

41) Integer underflow

EUVDB-ID: #VU91669

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27403

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer underflow within the flow_offload_dst_cookie() and nft_flow_dst_release() functions in net/netfilter/nf_flow_table_core.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

42) Double free

EUVDB-ID: #VU90924

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27433

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the clk_mt7622_apmixed_remove() function in drivers/clk/mediatek/clk-mt7622-apmixedsys.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

43) Resource management error

EUVDB-ID: #VU93202

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27437

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the vfio_intx_set_signal() function in drivers/vfio/pci/vfio_pci_intrs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

44) Memory leak

EUVDB-ID: #VU93016

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-31076

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the migrate_one_irq() function in kernel/irq/cpuhotplug.c, within the __send_cleanup_vector(), irq_complete_move() and irq_force_complete_move() functions in arch/x86/kernel/apic/vector.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

45) Use-after-free

EUVDB-ID: #VU90163

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35855

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mlxsw_sp_acl_tcam_ventry_activity_get() function in drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_tcam.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

46) Resource management error

EUVDB-ID: #VU93269

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35897

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the nf_tables_table_disable() and nf_tables_updtable() functions in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

47) NULL pointer dereference

EUVDB-ID: #VU91234

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35902

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the __rds_rdma_map() function in net/rds/rdma.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

48) Resource management error

EUVDB-ID: #VU93191

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35913

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the iwl_mvm_rx_session_protect_notif() function in drivers/net/wireless/intel/iwlwifi/mvm/time-event.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

49) Information disclosure

EUVDB-ID: #VU91344

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35939

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to information disclosure within the dma_direct_alloc(), __dma_direct_free_pages() and dma_direct_alloc_pages() functions in kernel/dma/direct.c. A local user can gain access to sensitive information.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

50) Out-of-bounds read

EUVDB-ID: #VU91391

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35949

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the __btrfs_check_leaf() and __btrfs_check_node() functions in fs/btrfs/tree-checker.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

51) NULL pointer dereference

EUVDB-ID: #VU93028

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36270

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the nf_tproxy_laddr4() function in net/ipv4/netfilter/nf_tproxy_ipv4.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

52) Improper locking

EUVDB-ID: #VU93036

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36286

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the instance_destroy_rcu() function in net/netfilter/nfnetlink_queue.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

53) Infinite loop

EUVDB-ID: #VU93062

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36288

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the gss_read_proxy_verf() function in net/sunrpc/auth_gss/svcauth_gss.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

54) NULL pointer dereference

EUVDB-ID: #VU93030

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36489

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the tls_ctx_create() function in net/tls/tls_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

55) Input validation error

EUVDB-ID: #VU90847

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36881

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the userfaultfd_release() function in fs/userfaultfd.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

56) NULL pointer dereference

EUVDB-ID: #VU90381

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36907

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the xs_tcp_tls_setup_socket() function in net/sunrpc/xprtsock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

57) Improper error handling

EUVDB-ID: #VU93449

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36929

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the skb_alloc_rx_flag() and skb_copy_expand() functions in net/core/skbuff.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

58) Use of uninitialized resource

EUVDB-ID: #VU90862

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36933

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the EXPORT_SYMBOL_GPL() and nsh_gso_segment() functions in net/nsh/nsh.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

59) Improper error handling

EUVDB-ID: #VU92054

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36939

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the nfs_net_init() function in fs/nfs/inode.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

60) Improper locking

EUVDB-ID: #VU91562

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36970

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the iwl_req_fw_callback() function in drivers/net/wireless/intel/iwlwifi/iwl-drv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

61) Use-after-free

EUVDB-ID: #VU92305

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36979

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the br_mst_vlan_set_state() and br_mst_set_state() functions in net/bridge/br_mst.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

62) NULL pointer dereference

EUVDB-ID: #VU92349

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38548

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the cdns_mhdp_atomic_enable() function in drivers/gpu/drm/bridge/cadence/cdns-mhdp8546-core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

63) Memory leak

EUVDB-ID: #VU92295

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38563

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the mt7996_mcu_get_temperature() function in drivers/net/wireless/mediatek/mt76/mt7996/mcu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

64) NULL pointer dereference

EUVDB-ID: #VU93007

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38609

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the __mt76_connac_mcu_alloc_sta_req() function in drivers/net/wireless/mediatek/mt76/mt76_connac_mcu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

65) Improper locking

EUVDB-ID: #VU93033

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38662

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the may_update_sockmap() and check_map_func_compatibility() functions in kernel/bpf/verifier.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

66) Improper locking

EUVDB-ID: #VU93824

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39476

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the raid5d() function in drivers/md/raid5.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

67) Improper locking

EUVDB-ID: #VU93825

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39483

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the svm_enable_nmi_window() function in arch/x86/kvm/svm/svm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

68) Memory leak

EUVDB-ID: #VU93818

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39484

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the davinci_mmcsd_remove() and __exit_p() functions in drivers/mmc/host/davinci_mmc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

69) Use-after-free

EUVDB-ID: #VU93834

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39486

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the drm_file_update_pid() function in drivers/gpu/drm/drm_file.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

70) Improper error handling

EUVDB-ID: #VU94087

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39488

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the arch/arm64/include/asm/asm-bug.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

71) Memory leak

EUVDB-ID: #VU94084

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39489

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the seg6_hmac_init_algo() and seg6_hmac_net_init() functions in net/ipv6/seg6_hmac.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

72) Improper error handling

EUVDB-ID: #VU94088

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39491

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the cs35l56_hda_unbind(), cs35l56_hda_common_probe() and cs35l56_hda_remove() functions in sound/pci/hda/cs35l56_hda.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

73) Memory leak

EUVDB-ID: #VU94086

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39493

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the adf_device_reset_worker() and adf_dev_aer_schedule_reset() functions in drivers/crypto/qat/qat_common/adf_aer.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

74) Buffer overflow

EUVDB-ID: #VU94313

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39497

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the drm_gem_shmem_mmap() function in drivers/gpu/drm/drm_gem_shmem_helper.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

75) Memory leak

EUVDB-ID: #VU94201

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39499

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the event_deliver() function in drivers/misc/vmw_vmci/vmci_event.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

76) NULL pointer dereference

EUVDB-ID: #VU94262

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39500

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the sock_map_close() function in net/core/sock_map.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

77) Improper locking

EUVDB-ID: #VU94277

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39501

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the uevent_show() function in drivers/base/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

78) NULL pointer dereference

EUVDB-ID: #VU94259

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39505

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the komeda_component_get_avail_scaler() function in drivers/gpu/drm/arm/display/komeda/komeda_pipeline_state.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

79) NULL pointer dereference

EUVDB-ID: #VU94258

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39506

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the lio_vf_rep_copy_packet() function in drivers/net/ethernet/cavium/liquidio/lio_vf_rep.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

80) Use-after-free

EUVDB-ID: #VU94229

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39508

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the WORKER_IDLE_TIMEOUT(), io_work_get_acct(), io_worker_exit(), io_wq_dec_running(), __io_worker_busy(), io_wq_worker(), io_wq_worker_running(), io_wq_worker_sleeping(), io_init_new_worker(), init_completion() and io_wq_work_match_item() functions in io_uring/io-wq.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

81) Resource management error

EUVDB-ID: #VU94310

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39509

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the implement() function in drivers/hid/hid-core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

82) Use-after-free

EUVDB-ID: #VU94228

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39510

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cachefiles_ondemand_daemon_read() function in fs/cachefiles/ondemand.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

83) Use-after-free

EUVDB-ID: #VU94227

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40899

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cachefiles_req_put(), cachefiles_ondemand_daemon_read() and cachefiles_ondemand_send_req() functions in fs/cachefiles/ondemand.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

84) Use-after-free

EUVDB-ID: #VU94226

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40900

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cachefiles_flush_reqs() function in fs/cachefiles/daemon.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

85) Buffer overflow

EUVDB-ID: #VU94296

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40902

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the ea_get() function in fs/jfs/xattr.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

86) Use-after-free

EUVDB-ID: #VU94225

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40903

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the tcpm_register_sink_caps() function in drivers/usb/typec/tcpm/tcpm.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

87) Improper locking

EUVDB-ID: #VU94283

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40904

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the wdm_int_callback() function in drivers/usb/class/cdc-wdm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

88) NULL pointer dereference

EUVDB-ID: #VU94257

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40905

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the rt6_get_pcpu_route() function in net/ipv6/route.c, within the __fib6_drop_pcpu_from() function in net/ipv6/ip6_fib.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

89) Use-after-free

EUVDB-ID: #VU94224

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40909

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the bpf_obj_get(), bpf_link_defer_dealloc_mult_rcu_gp() and bpf_link_free() functions in kernel/bpf/syscall.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

90) Memory leak

EUVDB-ID: #VU94203

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40910

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ax25_accept() function in net/ax25/af_ax25.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

91) NULL pointer dereference

EUVDB-ID: #VU94256

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40911

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the cfg80211_get_station() function in net/wireless/util.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

92) Improper locking

EUVDB-ID: #VU94282

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40912

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ieee80211_sta_ps_deliver_wakeup() function in net/mac80211/sta_info.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

93) Use-after-free

EUVDB-ID: #VU94214

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40913

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cachefiles_req_put(), cachefiles_ondemand_restore(), cachefiles_ondemand_get_fd() and cachefiles_ondemand_daemon_read() functions in fs/cachefiles/ondemand.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

94) Improper locking

EUVDB-ID: #VU94281

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40916

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the hdmi_get_modes() function in drivers/gpu/drm/exynos/exynos_hdmi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

95) Use-after-free

EUVDB-ID: #VU94221

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40920

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the br_mst_set_state() function in net/bridge/br_mst.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

96) NULL pointer dereference

EUVDB-ID: #VU94253

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40921

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the br_mst_get_state(), br_mst_set_state() and br_mst_vlan_sync_state() functions in net/bridge/br_mst.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

97) Improper locking

EUVDB-ID: #VU94279

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40922

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the io_rsrc_ref_quiesce() function in io_uring/rsrc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

98) Buffer overflow

EUVDB-ID: #VU94314

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40924

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the drivers/gpu/drm/i915/gem/i915_gem_object.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

99) Use of uninitialized resource

EUVDB-ID: #VU94292

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40926

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the nouveau_display_hpd_resume(), nouveau_display_fini() and nouveau_display_create() functions in drivers/gpu/drm/nouveau/nouveau_display.c, within the nv50_display_fini() function in drivers/gpu/drm/nouveau/dispnv50/disp.c, within the nv04_display_fini() function in drivers/gpu/drm/nouveau/dispnv04/disp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

100) Use-after-free

EUVDB-ID: #VU94220

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40927

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the xhci_invalidate_cancelled_tds() and xhci_handle_cmd_set_deq() functions in drivers/usb/host/xhci-ring.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

101) Out-of-bounds read

EUVDB-ID: #VU94234

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40929

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the iwl_mvm_scan_umac_dwell() and iwl_mvm_scan_umac_dwell_v10() functions in drivers/net/wireless/intel/iwlwifi/mvm/scan.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

102) Input validation error

EUVDB-ID: #VU94285

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40930

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the cfg80211_6ghz_power_type_valid() function in net/wireless/scan.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

103) Memory leak

EUVDB-ID: #VU94204

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40932

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the vidi_get_modes() function in drivers/gpu/drm/exynos/exynos_drm_vidi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

104) Memory leak

EUVDB-ID: #VU94205

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40934

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the logi_dj_recv_switch_to_dj_mode() function in drivers/hid/hid-logitech-dj.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

105) Memory leak

EUVDB-ID: #VU94206

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40936

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the devm_cxl_add_region() and __create_region() functions in drivers/cxl/core/region.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

106) Input validation error

EUVDB-ID: #VU94320

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40938

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the current_check_refer_path() function in security/landlock/fs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

107) Input validation error

EUVDB-ID: #VU94321

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40939

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ipc_devlink_create_region() function in drivers/net/wwan/iosm/iosm_ipc_devlink.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

108) Buffer overflow

EUVDB-ID: #VU94315

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40941

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the iwl_mvm_mfu_assert_dump_notif() function in drivers/net/wireless/intel/iwlwifi/mvm/fw.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

109) Memory leak

EUVDB-ID: #VU94207

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40942

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the mesh_path_discard_frame() function in net/mac80211/mesh_pathtbl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

110) Improper locking

EUVDB-ID: #VU94278

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40943

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the __ocfs2_change_file_space() function in fs/ocfs2/file.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

111) Input validation error

EUVDB-ID: #VU94317

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40944

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the machine_kexec_cleanup() and machine_kexec() functions in arch/x86/kernel/machine_kexec_64.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

112) NULL pointer dereference

EUVDB-ID: #VU94250

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40945

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the include/linux/iommu.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

113) Use-after-free

EUVDB-ID: #VU94217

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40954

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the sk_common_release() function in net/core/sock.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

114) Use-after-free

EUVDB-ID: #VU94216

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40956

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the irq_process_work_list() function in drivers/dma/idxd/irq.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

115) NULL pointer dereference

EUVDB-ID: #VU94247

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40957

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the input_action_end_dx6() and input_action_end_dx4() functions in net/ipv6/seg6_local.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

116) Use-after-free

EUVDB-ID: #VU94215

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40958

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the EXPORT_SYMBOL_GPL() function in net/core/net_namespace.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

117) NULL pointer dereference

EUVDB-ID: #VU94246

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40959

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the xfrm6_get_saddr() function in net/ipv6/xfrm6_policy.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

118) NULL pointer dereference

EUVDB-ID: #VU94243

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40962

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the btrfs_submit_chunk() function in fs/btrfs/bio.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

119) NULL pointer dereference

EUVDB-ID: #VU94242

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40964

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the cs35l41_hda_unbind() function in sound/pci/hda/cs35l41_hda.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

120) Improper locking

EUVDB-ID: #VU94274

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40967

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the imx_uart_console_write() function in drivers/tty/serial/imx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

121) Race condition

EUVDB-ID: #VU94297

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40976

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the lima_sched_timedout_job() function in drivers/gpu/drm/lima/lima_sched.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

122) Improper locking

EUVDB-ID: #VU94271

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40977

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the mt76s_tx_status_data() function in drivers/net/wireless/mediatek/mt76/sdio.c, within the mt7921s_mac_reset() function in drivers/net/wireless/mediatek/mt76/mt7921/sdio_mac.c, within the mt7921e_mac_reset() function in drivers/net/wireless/mediatek/mt76/mt7921/pci_mac.c, within the mt7921_mac_reset_work() function in drivers/net/wireless/mediatek/mt76/mt7921/mac.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

123) Resource management error

EUVDB-ID: #VU94299

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40978

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the qedi_dbg_do_not_recover_cmd_read() function in drivers/scsi/qedi/qedi_debugfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

124) Improper locking

EUVDB-ID: #VU94269

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40981

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the batadv_purge_orig_ref() function in net/batman-adv/originator.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

125) NULL pointer dereference

EUVDB-ID: #VU94240

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40982

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ssb_bus_match() function in drivers/ssb/main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

126) NULL pointer dereference

EUVDB-ID: #VU94239

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40984

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the acpi_ex_system_memory_space_handler() function in drivers/acpi/acpica/exregion.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

127) Resource management error

EUVDB-ID: #VU94307

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40987

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the sumo_construct_vid_mapping_table() function in drivers/gpu/drm/amd/amdgpu/kv_dpm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

128) Resource management error

EUVDB-ID: #VU94308

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40988

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the sumo_construct_vid_mapping_table() function in drivers/gpu/drm/radeon/sumo_dpm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

129) Input validation error

EUVDB-ID: #VU94324

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40989

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the vgic_v3_free_redist_region() and vgic_v3_set_redist_base() functions in arch/arm64/kvm/vgic/vgic-mmio-v3.c, within the kvm_vgic_dist_destroy() function in arch/arm64/kvm/vgic/vgic-init.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

130) Input validation error

EUVDB-ID: #VU94325

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40990

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the mlx5_ib_create_srq() function in drivers/infiniband/hw/mlx5/srq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

131) Buffer overflow

EUVDB-ID: #VU94302

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40992

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the rxe_resp_check_length() function in drivers/infiniband/sw/rxe/rxe_resp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

132) Integer overflow

EUVDB-ID: #VU94294

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40994

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the max_vclocks_store() function in drivers/ptp/ptp_sysfs.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

133) Improper locking

EUVDB-ID: #VU94267

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40995

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the tcf_idr_check_alloc() and rcu_read_unlock() functions in net/sched/act_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

134) Memory leak

EUVDB-ID: #VU94210

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40997

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the amd_pstate_epp_cpu_exit() function in drivers/cpufreq/amd-pstate.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

135) Integer overflow

EUVDB-ID: #VU94295

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41000

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the blkpg_do_ioctl() function in block/ioctl.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

136) Memory leak

EUVDB-ID: #VU94211

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41001

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the io_sq_thread() function in io_uring/sqpoll.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

137) Memory leak

EUVDB-ID: #VU94212

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41002

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the sec_alg_resource_free() function in drivers/crypto/hisilicon/sec2/sec_crypto.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

138) Improper locking

EUVDB-ID: #VU94265

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41004

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the kernel/trace/Kconfig. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

139) Resource management error

EUVDB-ID: #VU94345

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41007

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the tcp_rtx_probe0_timed_out() function in net/ipv4/tcp_timer.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

140) Input validation error

EUVDB-ID: #VU94508

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41009

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the __aligned(), bpf_ringbuf_alloc(), bpf_ringbuf_restore_from_rec() and __bpf_ringbuf_reserve() functions in kernel/bpf/ringbuf.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

141) Use-after-free

EUVDB-ID: #VU94507

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41010

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ingress_init(), ingress_destroy(), clsact_init() and clsact_destroy() functions in net/sched/sch_ingress.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

142) Input validation error

EUVDB-ID: #VU94530

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41011

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the kfd_ioctl_alloc_memory_of_gpu(), criu_restore_memory_of_gpu() and kfd_mmio_mmap() functions in drivers/gpu/drm/amd/amdkfd/kfd_chardev.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

143) Use-after-free

EUVDB-ID: #VU94672

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41012

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the fcntl_setlk() function in fs/locks.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

144) Input validation error

EUVDB-ID: #VU94842

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41015

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ocfs2_check_dir_entry(), ocfs2_search_dirblock(), __ocfs2_delete_entry(), __ocfs2_add_entry(), ocfs2_dir_foreach_blk_id(), ocfs2_dir_foreach_blk_el(), ocfs2_find_dir_space_id() and ocfs2_find_dir_space_el() functions in fs/ocfs2/dir.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

145) Out-of-bounds read

EUVDB-ID: #VU94837

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41016

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ocfs2_xattr_find_entry() function in fs/ocfs2/xattr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

146) Improper locking

EUVDB-ID: #VU94996

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41020

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the fcntl_setlk64() function in fs/locks.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

147) Improper error handling

EUVDB-ID: #VU95022

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41022

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the sdma_v4_0_process_trap_irq() function in drivers/gpu/drm/amd/amdgpu/sdma_v4_0.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

148) Input validation error

EUVDB-ID: #VU95105

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41024

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the is_attach_rejected() and fastrpc_device_ioctl() functions in drivers/misc/fastrpc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

149) Memory leak

EUVDB-ID: #VU94925

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41025

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the fastrpc_init_create_static_process() function in drivers/misc/fastrpc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

150) Out-of-bounds read

EUVDB-ID: #VU94954

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41028

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the drivers/platform/x86/toshiba_acpi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

151) Buffer overflow

EUVDB-ID: #VU95079

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41032

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the DEFINE_PER_CPU() function in mm/vmalloc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

152) Input validation error

EUVDB-ID: #VU95109

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41035

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the usb_parse_endpoint() function in drivers/usb/core/config.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

153) Improper locking

EUVDB-ID: #VU94995

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41036

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ks8851_tx_work() function in drivers/net/ethernet/micrel/ks8851_spi.c, within the ks8851_irq() and ks8851_set_rx_mode() functions in drivers/net/ethernet/micrel/ks8851_common.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

154) NULL pointer dereference

EUVDB-ID: #VU94975

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41037

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the hda_dai_suspend() function in sound/soc/sof/intel/hda-dai.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

155) Buffer overflow

EUVDB-ID: #VU95048

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41038

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the cs_dsp_coeff_parse_string(), cs_dsp_coeff_parse_int(), cs_dsp_coeff_parse_coeff() and cs_dsp_parse_coeff() functions in drivers/firmware/cirrus/cs_dsp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

156) Buffer overflow

EUVDB-ID: #VU95042

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41039

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the cs_dsp_adsp1_parse_sizes(), cs_dsp_adsp2_parse_sizes(), cs_dsp_load() and cs_dsp_buf_free() functions in drivers/firmware/cirrus/cs_dsp.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

157) Use-after-free

EUVDB-ID: #VU94949

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41040

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the net/sched/act_ct.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

158) Resource management error

EUVDB-ID: #VU95069

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41041

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the sock_set_flag() and spin_unlock() functions in net/ipv4/udp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

159) Input validation error

EUVDB-ID: #VU95108

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41044

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ppp_read() and ppp_write() functions in drivers/net/ppp/ppp_generic.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

160) Use-after-free

EUVDB-ID: #VU94948

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41045

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the bpf_timer_delete_work(), __bpf_async_init() and __bpf_spin_unlock_irqrestore() functions in kernel/bpf/helpers.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

161) NULL pointer dereference

EUVDB-ID: #VU94982

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41048

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the sk_msg_recvmsg() function in net/core/skmsg.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

162) Use-after-free

EUVDB-ID: #VU94947

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41049

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the posix_lock_inode() function in fs/locks.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

163) Improper locking

EUVDB-ID: #VU94993

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41050

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the cachefiles_ondemand_send_req() function in fs/cachefiles/ondemand.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

164) Use-after-free

EUVDB-ID: #VU94946

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41051

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cachefiles_ondemand_clean_object() function in fs/cachefiles/ondemand.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

165) Input validation error

EUVDB-ID: #VU95107

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41056

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the cs_dsp_coeff_parse_alg() and cs_dsp_coeff_parse_coeff() functions in drivers/firmware/cirrus/cs_dsp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

166) Use-after-free

EUVDB-ID: #VU94945

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41057

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cachefiles_free_volume() function in fs/cachefiles/volume.c, within the cachefiles_withdraw_objects() and cachefiles_withdraw_cache() functions in fs/cachefiles/cache.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

167) Use-after-free

EUVDB-ID: #VU94944

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41058

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cachefiles_withdraw_volumes() function in fs/cachefiles/cache.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

168) Use of uninitialized resource

EUVDB-ID: #VU95033

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41059

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the hfsplus_listxattr() function in fs/hfsplus/xattr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

169) NULL pointer dereference

EUVDB-ID: #VU94978

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41060

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the radeon_gem_va_update_vm() function in drivers/gpu/drm/radeon/radeon_gem.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

170) Out-of-bounds read

EUVDB-ID: #VU94955

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41061

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the dml2_calculate_rq_and_dlg_params() function in drivers/gpu/drm/amd/display/dc/dml2/dml2_utils.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

171) NULL pointer dereference

EUVDB-ID: #VU94977

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41062

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the l2cap_sock_kill(), l2cap_sock_new_connection_cb() and l2cap_sock_recv_cb() functions in net/bluetooth/l2cap_sock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

172) Improper locking

EUVDB-ID: #VU94992

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41063

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the hci_unregister_dev() function in net/bluetooth/hci_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

173) Improper locking

EUVDB-ID: #VU94991

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41064

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the eeh_pe_bus_get() function in arch/powerpc/kernel/eeh_pe.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

174) Memory leak

EUVDB-ID: #VU94926

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41065

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the alloc_dispatch_log_kmem_cache() function in arch/powerpc/platforms/pseries/setup.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

175) Memory leak

EUVDB-ID: #VU94927

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41066

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ibmvnic_xmit() function in drivers/net/ethernet/ibm/ibmvnic.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

176) Resource management error

EUVDB-ID: #VU95072

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41068

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the sclp_init() function in drivers/s390/char/sclp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

177) Use-after-free

EUVDB-ID: #VU94943

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41069

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the soc_tplg_dapm_graph_elems_load() function in sound/soc/soc-topology.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

178) Use-after-free

EUVDB-ID: #VU94942

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41070

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the kvm_spapr_tce_attach_iommu_group() function in arch/powerpc/kvm/book3s_64_vio.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

179) Out-of-bounds read

EUVDB-ID: #VU94956

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41071

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ieee80211_prep_hw_scan() function in net/mac80211/scan.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

180) Input validation error

EUVDB-ID: #VU95106

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41072

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the cfg80211_wext_siwscan() function in net/wireless/scan.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

181) Double free

EUVDB-ID: #VU95011

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41073

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the nvme_cleanup_cmd() function in drivers/nvme/host/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

182) Improper locking

EUVDB-ID: #VU95087

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41074

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the cachefiles_ondemand_copen() function in fs/cachefiles/ondemand.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

183) Input validation error

EUVDB-ID: #VU95004

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41075

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the cachefiles_ondemand_fd_llseek(), cachefiles_ondemand_fd_ioctl() and cachefiles_ondemand_copen() functions in fs/cachefiles/ondemand.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

184) Memory leak

EUVDB-ID: #VU94928

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41076

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the nfs4_set_security_label() function in fs/nfs/nfs4proc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

185) Memory leak

EUVDB-ID: #VU94929

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41078

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the btrfs_quota_disable() function in fs/btrfs/qgroup.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

186) Memory leak

EUVDB-ID: #VU94930

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41079

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the nvmet_execute_admin_connect() and nvmet_execute_io_connect() functions in drivers/nvme/target/fabrics-cmd.c, within the pr_debug() and nvmet_execute_auth_receive() functions in drivers/nvme/target/fabrics-cmd-auth.c, within the nvmet_req_init() function in drivers/nvme/target/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

187) Improper locking

EUVDB-ID: #VU94990

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41080

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the io_register_iowq_max_workers() function in io_uring/register.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

188) Resource management error

EUVDB-ID: #VU95051

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41081

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the ila_output() function in net/ipv6/ila/ila_lwt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

189) NULL pointer dereference

EUVDB-ID: #VU94973

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41084

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the __cxl_dpa_to_region() function in drivers/cxl/core/region.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

190) Double free

EUVDB-ID: #VU95008

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41087

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the ata_host_alloc() function in drivers/ata/libata-core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

191) Improper locking

EUVDB-ID: #VU94989

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41088

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the mcp251xfd_tx_obj_from_skb(), mcp251xfd_tx_busy() and mcp251xfd_start_xmit() functions in drivers/net/can/spi/mcp251xfd/mcp251xfd-tx.c, within the mcp251xfd_open() and mcp251xfd_stop() functions in drivers/net/can/spi/mcp251xfd/mcp251xfd-core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

192) NULL pointer dereference

EUVDB-ID: #VU94971

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41089

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the nv17_tv_get_hd_modes() function in drivers/gpu/drm/nouveau/dispnv04/tvnv17.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

193) Use-after-free

EUVDB-ID: #VU94938

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41092

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the i915_vma_revoke_fence() function in drivers/gpu/drm/i915/gt/intel_ggtt_fencing.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

194) Improper error handling

EUVDB-ID: #VU95019

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41093

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the amdgpu_vkms_prepare_fb() and amdgpu_vkms_cleanup_fb() functions in drivers/gpu/drm/amd/amdgpu/amdgpu_vkms.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

195) Buffer overflow

EUVDB-ID: #VU95056

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41094

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the drm_fbdev_dma_helper_fb_probe() function in drivers/gpu/drm/drm_fbdev_dma.c, within the drm_fb_helper_alloc_info() and __drm_fb_helper_initial_config_and_unlock() functions in drivers/gpu/drm/drm_fb_helper.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

196) NULL pointer dereference

EUVDB-ID: #VU94966

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41095

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the nv17_tv_get_ld_modes() function in drivers/gpu/drm/nouveau/dispnv04/tvnv17.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

197) Use-after-free

EUVDB-ID: #VU94941

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41096

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the msi_capability_init() function in drivers/pci/msi/msi.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

198) Resource management error

EUVDB-ID: #VU95067

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41097

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the cxacru_bind() function in drivers/usb/atm/cxacru.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

199) NULL pointer dereference

EUVDB-ID: #VU94970

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41098

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ata_host_release() function in drivers/ata/libata-core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

200) Input validation error

EUVDB-ID: #VU95084

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42064

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the dml2_calculate_rq_and_dlg_params() and dml2_verify_det_buffer_configuration() functions in drivers/gpu/drm/amd/display/dc/dml2/dml2_utils.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

201) Double free

EUVDB-ID: #VU95009

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42069

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the add_adev() function in drivers/net/ethernet/microsoft/mana/mana_en.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

202) Type Confusion

EUVDB-ID: #VU94923

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42070

CWE-ID: CWE-843 - Type confusion

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to a type confusion error within the nft_lookup_init() function in net/netfilter/nft_lookup.c, within the nf_tables_fill_setelem() and nft_validate_register_store() functions in net/netfilter/nf_tables_api.c. A local user can pass specially crafted data to the packet filtering to trigger a type confusion error and gain access to sensitive information.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

203) Use-after-free

EUVDB-ID: #VU94940

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42073

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mlxsw_sp_sb_sr_occ_query_cb(), mlxsw_reg_sbsr_pack() and mlxsw_sp_sb_occ_max_clear() functions in drivers/net/ethernet/mellanox/mlxsw/spectrum_buffers.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

204) NULL pointer dereference

EUVDB-ID: #VU94969

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42074

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the snd_acp_resume() function in sound/soc/amd/acp/acp-pci.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

205) Use of uninitialized resource

EUVDB-ID: #VU95031

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42076

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the MODULE_ALIAS() and j1939_send_one() functions in net/can/j1939/main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

206) Resource management error

EUVDB-ID: #VU95068

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42077

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the ocfs2_extend_trans() function in fs/ocfs2/journal.c, within the ocfs2_dio_end_io_write() function in fs/ocfs2/aops.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

207) NULL pointer dereference

EUVDB-ID: #VU94968

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42079

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the gfs2_jindex_free() function in fs/gfs2/super.c, within the lops_before_commit() function in fs/gfs2/log.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

208) Input validation error

EUVDB-ID: #VU95103

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42080

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the rdma_restrack_init() and type2str() functions in drivers/infiniband/core/restrack.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

209) Buffer overflow

EUVDB-ID: #VU95055

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42082

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the __xdp_reg_mem_model() function in net/core/xdp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

210) NULL pointer dereference

EUVDB-ID: #VU94965

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42085

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the dwc3_suspend_common() and dwc3_resume_common() functions in drivers/usb/dwc3/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

211) Buffer overflow

EUVDB-ID: #VU95041

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42086

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the bme680_compensate_temp(), bme680_compensate_press() and bme680_compensate_humid() functions in drivers/iio/chemical/bme680_core.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

212) Resource management error

EUVDB-ID: #VU95066

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42087

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the ili9881c_prepare() and ili9881c_unprepare() functions in drivers/gpu/drm/panel/panel-ilitek-ili9881c.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

213) NULL pointer dereference

EUVDB-ID: #VU94964

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42089

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the fsl_asoc_card_probe() function in sound/soc/fsl/fsl-asoc-card.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

214) Improper locking

EUVDB-ID: #VU94988

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42090

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the create_pinctrl() function in drivers/pinctrl/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

215) Input validation error

EUVDB-ID: #VU95000

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42092

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the davinci_gpio_probe() function in drivers/gpio/gpio-davinci.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

216) Buffer overflow

EUVDB-ID: #VU95039

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42093

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the dpaa2_eth_xdp_xmit() and update_xps() functions in drivers/net/ethernet/freescale/dpaa2/dpaa2-eth.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

217) Input validation error

EUVDB-ID: #VU95101

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42095

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the uart_write() and omap8250_irq() functions in drivers/tty/serial/8250/8250_omap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

218) Improper locking

EUVDB-ID: #VU94987

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42096

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the profile_pc() function in arch/x86/kernel/time.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

219) Input validation error

EUVDB-ID: #VU95001

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42097

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the load_data() and load_guspatch() functions in sound/synth/emux/soundfont.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

220) Input validation error

EUVDB-ID: #VU95100

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42098

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ecdh_set_secret() function in crypto/ecdh.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

221) NULL pointer dereference

EUVDB-ID: #VU94963

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42101

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the nouveau_connector_get_modes() function in drivers/gpu/drm/nouveau/nouveau_connector.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

222) Use-after-free

EUVDB-ID: #VU94937

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42104

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the nilfs_check_page() and nilfs_error() functions in fs/nilfs2/dir.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

223) Use-after-free

EUVDB-ID: #VU94936

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42105

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the nilfs_store_disk_layout() function in fs/nilfs2/the_nilfs.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

224) Use of uninitialized resource

EUVDB-ID: #VU95024

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42106

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the inet_diag_dump_compat() and inet_diag_get_exact_compat() functions in net/ipv4/inet_diag.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

225) NULL pointer dereference

EUVDB-ID: #VU94962

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42107

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ice_ptp_extts_event() function in drivers/net/ethernet/intel/ice/ice_ptp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

226) Use-after-free

EUVDB-ID: #VU94934

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42109

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the nft_rcv_nl_event() function in net/netfilter/nf_tables_api.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

227) Resource management error

EUVDB-ID: #VU95050

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42110

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the ntb_netdev_rx_handler() function in drivers/net/ntb_netdev.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

228) Use of uninitialized resource

EUVDB-ID: #VU95025

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42113

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the wx_set_interrupt_capability() function in drivers/net/ethernet/wangxun/libwx/wx_lib.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

229) Improper locking

EUVDB-ID: #VU94986

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42114

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the NLA_POLICY_FULL_RANGE() function in net/wireless/nl80211.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

230) Use-after-free

EUVDB-ID: #VU94932

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42115

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the jffs2_i_init_once() function in fs/jffs2/super.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

231) Reachable assertion

EUVDB-ID: #VU95005

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42117

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to reachable assertion within the find_disp_cfg_idx_by_plane_id() and find_disp_cfg_idx_by_stream_id() functions in drivers/gpu/drm/amd/display/dc/dml2/dml2_dc_resource_mgmt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

232) Improper error handling

EUVDB-ID: #VU95015

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42119

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the find_first_free_audio() function in drivers/gpu/drm/amd/display/dc/core/dc_resource.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

233) Input validation error

EUVDB-ID: #VU95099

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42120

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the dce110_vblank_set() function in drivers/gpu/drm/amd/display/dc/irq/dce110/irq_service_dce110.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

234) Input validation error

EUVDB-ID: #VU95098

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42121

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the read() and write() functions in drivers/gpu/drm/amd/display/modules/hdcp/hdcp_ddc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

235) NULL pointer dereference

EUVDB-ID: #VU94961

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42122

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the dcn31_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn351/dcn351_resource.c, within the dcn31_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn35/dcn35_resource.c, within the dcn321_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn321/dcn321_resource.c, within the dcn32_hpo_dp_link_encoder_create() and dml1_validate() functions in drivers/gpu/drm/amd/display/dc/resource/dcn32/dcn32_resource.c, within the dcn31_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn316/dcn316_resource.c, within the dcn31_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn315/dcn315_resource.c, within the dcn31_hpo_dp_link_encoder_create() and dcn314_validate_bandwidth() functions in drivers/gpu/drm/amd/display/dc/resource/dcn314/dcn314_resource.c, within the dcn31_hpo_dp_link_encoder_create() and dcn31_validate_bandwidth() functions in drivers/gpu/drm/amd/display/dc/resource/dcn31/dcn31_resource.c, within the dcn30_validate_bandwidth() function in drivers/gpu/drm/amd/display/dc/resource/dcn30/dcn30_resource.c, within the dcn32_clk_mgr_construct() function in drivers/gpu/drm/amd/display/dc/clk_mgr/dcn32/dcn32_clk_mgr.c, within the dcn3_clk_mgr_construct() function in drivers/gpu/drm/amd/display/dc/clk_mgr/dcn30/dcn30_clk_mgr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

236) Input validation error

EUVDB-ID: #VU95097

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42124

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the qedf_execute_tmf() function in drivers/scsi/qedf/qedf_io.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

237) Input validation error

EUVDB-ID: #VU95081

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42125

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the rtw89_scan_get_6g_disabled_chan() function in drivers/net/wireless/realtek/rtw89/fw.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

238) Input validation error

EUVDB-ID: #VU94997

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42126

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the pcpu_cpu_to_node() and setup_per_cpu_areas() functions in arch/powerpc/kernel/setup_64.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

239) Improper error handling

EUVDB-ID: #VU95014

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42127

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the lima_pp_init() and lima_pp_bcast_init() functions in drivers/gpu/drm/lima/lima_pp.c, within the lima_mmu_init() function in drivers/gpu/drm/lima/lima_mmu.c, within the lima_gp_init() function in drivers/gpu/drm/lima/lima_gp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

240) Incorrect calculation

EUVDB-ID: #VU95075

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42130

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the virtual_ncidev_write() function in drivers/nfc/virtual_ncidev.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

241) Integer overflow

EUVDB-ID: #VU95035

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42131

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the domain_dirty_limits(), node_dirty_limit(), dirty_background_bytes_handler() and dirty_bytes_handler() functions in mm/page-writeback.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

242) Resource management error

EUVDB-ID: #VU95060

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42132

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the hci_conn_hash_alloc_unset() and hci_conn_add_unset() functions in net/bluetooth/hci_conn.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

243) Input validation error

EUVDB-ID: #VU95096

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42133

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the hci_le_big_sync_established_evt() function in net/bluetooth/hci_event.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

244) Integer overflow

EUVDB-ID: #VU95036

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42136

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the cdrom_ioctl_timed_media_change() function in drivers/cdrom/cdrom.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

245) Use-after-free

EUVDB-ID: #VU94931

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42137

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the qca_serdev_shutdown() function in drivers/bluetooth/hci_qca.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

246) NULL pointer dereference

EUVDB-ID: #VU94959

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42138

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the vfree() function in drivers/net/ethernet/mellanox/mlxsw/core_linecards.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

247) Input validation error

EUVDB-ID: #VU95082

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42139

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ice_ptp_extts_event(), ice_ptp_cfg_extts(), ice_ptp_gpio_enable_e810(), ice_ptp_gpio_enable_e823(), ice_ptp_rebuild_owner() and ice_ptp_release() functions in drivers/net/ethernet/intel/ice/ice_ptp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

248) Improper locking

EUVDB-ID: #VU94984

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42141

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the iso_sock_recvmsg() function in net/bluetooth/iso.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

249) Input validation error

EUVDB-ID: #VU95083

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42142

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the acl_ingress_ofld_setup(), esw_acl_ingress_src_port_drop_create(), esw_acl_ingress_ofld_groups_destroy() and esw_acl_ingress_ofld_setup() functions in drivers/net/ethernet/mellanox/mlx5/core/esw/acl/ingress_ofld.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

250) Out-of-bounds read

EUVDB-ID: #VU94951

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42143

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the orangefs_statfs() function in fs/orangefs/super.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

251) NULL pointer dereference

EUVDB-ID: #VU94958

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42144

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the lvts_probe() function in drivers/thermal/mediatek/lvts_thermal.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

252) Buffer overflow

EUVDB-ID: #VU95054

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42145

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the MODULE_AUTHOR(), __get_agent(), send_handler(), recv_handler() and ib_umad_read() functions in drivers/infiniband/core/user_mad.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

253) Input validation error

EUVDB-ID: #VU95094

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42147

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the dfx_regs_uninit(), qm_diff_regs_init() and qm_last_regs_init() functions in drivers/crypto/hisilicon/debugfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

254) Out-of-bounds read

EUVDB-ID: #VU94952

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42148

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the drivers/net/ethernet/broadcom/bnx2x/bnx2x.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

255) Memory leak

EUVDB-ID: #VU94922

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42152

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the nvmet_sq_destroy() function in drivers/nvme/target/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

256) Improper locking

EUVDB-ID: #VU94983

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42153

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the wait_reset(), i2c_pnx_master_xmit(), i2c_pnx_master_rcv(), i2c_pnx_interrupt(), i2c_pnx_timeout(), i2c_pnx_xfer() and i2c_pnx_probe() functions in drivers/i2c/busses/i2c-pnx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

257) Input validation error

EUVDB-ID: #VU95092

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42155

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the pkey_unlocked_ioctl() function in drivers/s390/crypto/pkey_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

258) Input validation error

EUVDB-ID: #VU95091

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42156

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the pkey_unlocked_ioctl() function in drivers/s390/crypto/pkey_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

259) Input validation error

EUVDB-ID: #VU95090

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42157

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the pkey_unlocked_ioctl() function in drivers/s390/crypto/pkey_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

260) Resource management error

EUVDB-ID: #VU95064

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42158

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the pkey_unlocked_ioctl() function in drivers/s390/crypto/pkey_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

261) Input validation error

EUVDB-ID: #VU95089

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42159

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the mpi3mr_sas_port_add() function in drivers/scsi/mpi3mr/mpi3mr_transport.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

262) Use of uninitialized resource

EUVDB-ID: #VU95027

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42161

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the tools/lib/bpf/bpf_core_read.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

263) Incorrect calculation

EUVDB-ID: #VU95074

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42162

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the gve_get_drvinfo() and gve_get_ethtool_stats() functions in drivers/net/ethernet/google/gve/gve_ethtool.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

264) Integer overflow

EUVDB-ID: #VU95037

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42223

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the tda10048_set_if() function in drivers/media/dvb-frontends/tda10048.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

265) Improper error handling

EUVDB-ID: #VU95012

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42224

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the mv88e6xxx_default_mdio_bus() function in drivers/net/dsa/mv88e6xxx/chip.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

266) Use of uninitialized resource

EUVDB-ID: #VU95028

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42225

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the mt7915_mcu_add_nested_subtlv() function in drivers/net/wireless/mediatek/mt76/mt7915/mcu.c, within the mt76_connac_mcu_add_nested_tlv(), mt76_connac_mcu_hw_scan(), mt76_connac_mcu_sched_scan_req(), mt76_connac_mcu_update_gtk_rekey() and mt76_connac_mcu_set_wow_pattern() functions in drivers/net/wireless/mediatek/mt76/mt76_connac_mcu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

267) Resource management error

EUVDB-ID: #VU95063

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42226

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the handle_tx_event() function in drivers/usb/host/xhci-ring.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

268) Input validation error

EUVDB-ID: #VU95088

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42227

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the dml_core_mode_programming() function in drivers/gpu/drm/amd/display/dc/dml2/display_mode_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

269) Use of uninitialized resource

EUVDB-ID: #VU95029

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42228

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the amdgpu_vce_ring_parse_cs() function in drivers/gpu/drm/amd/amdgpu/amdgpu_vce.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

270) Buffer overflow

EUVDB-ID: #VU95078

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42229

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the setkey_unaligned() function in crypto/cipher.c, within the setkey_unaligned() function in crypto/aead.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

271) Resource management error

EUVDB-ID: #VU95062

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42230

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the define_machine() function in arch/powerpc/platforms/pseries/setup.c, within the pseries_kexec_cpu_down() function in arch/powerpc/platforms/pseries/kexec.c, within the default_machine_kexec() function in arch/powerpc/kexec/core_64.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

272) Use-after-free

EUVDB-ID: #VU95503

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42232

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the delayed_work() and EXPORT_SYMBOL() functions in net/ceph/mon_client.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

273) Memory leak

EUVDB-ID: #VU95502

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42236

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the usb_string_copy() function in drivers/usb/gadget/configfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

274) Infinite loop

EUVDB-ID: #VU95513

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42237

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the cs_dsp_load(), cs_dsp_load_coeff() and regmap_async_complete() functions in drivers/firmware/cirrus/cs_dsp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

275) Infinite loop

EUVDB-ID: #VU95514

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42238

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the cs_dsp_load() and cs_dsp_load_coeff() functions in drivers/firmware/cirrus/cs_dsp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

276) Improper locking

EUVDB-ID: #VU95507

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42239

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the __bpf_async_init(), drop_prog_refcnt(), BPF_CALL_1() and hrtimer_cancel() functions in kernel/bpf/helpers.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

277) Buffer overflow

EUVDB-ID: #VU95516

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42240

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the SYM_INNER_LABEL() function in arch/x86/entry/entry_64_compat.S. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

278) Resource management error

EUVDB-ID: #VU95517

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42241

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the shmem_confirm_swap() and shmem_is_huge() functions in mm/shmem.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

279) Input validation error

EUVDB-ID: #VU95510

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42244

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the mos7840_port_remove() function in drivers/usb/serial/mos7840.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

280) Improper locking

EUVDB-ID: #VU95508

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42245

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the detach_tasks() function in kernel/sched/fair.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

281) Infinite loop

EUVDB-ID: #VU95515

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42246

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the xs_tcp_setup_socket() function in net/sunrpc/xprtsock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

282) Resource management error

EUVDB-ID: #VU95518

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42247

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the swap_endian() function in drivers/net/wireguard/allowedips.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

283) Improper locking

EUVDB-ID: #VU95509

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42250

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the cachefiles_daemon_poll() function in fs/cachefiles/daemon.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

284) Resource management error

EUVDB-ID: #VU95562

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42253

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the pca953x_irq_bus_sync_unlock() function in drivers/gpio/gpio-pca953x.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

285) Buffer overflow

EUVDB-ID: #VU96008

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42259

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the i915_error_to_vmf_fault() and vm_fault_gtt() functions in drivers/gpu/drm/i915/gem/i915_gem_mman.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

286) Improper locking

EUVDB-ID: #VU96159

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42268

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the mlx5_fw_reset_set_live_patch() and mlx5_fw_reset_complete_reload() functions in drivers/net/ethernet/mellanox/mlx5/core/fw_reset.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

287) NULL pointer dereference

EUVDB-ID: #VU96146

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42269

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ip6table_nat_init() function in net/ipv6/netfilter/ip6table_nat.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

288) NULL pointer dereference

EUVDB-ID: #VU96145

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42270

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the iptable_nat_init() function in net/ipv4/netfilter/iptable_nat.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

289) Use-after-free

EUVDB-ID: #VU96105

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42271

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the iucv_sever_path() function in net/iucv/af_iucv.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

290) Improper locking

EUVDB-ID: #VU96158

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42274

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the update_pcm_pointers() and amdtp_domain_stream_pcm_pointer() functions in sound/firewire/amdtp-stream.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

291) Input validation error

EUVDB-ID: #VU96205

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42276

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the nvme_prep_rq() function in drivers/nvme/host/pci.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

292) NULL pointer dereference

EUVDB-ID: #VU96144

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42277

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the sprd_iommu_cleanup() function in drivers/iommu/sprd-iommu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

293) NULL pointer dereference

EUVDB-ID: #VU96143

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42278

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the tasdev_load_calibrated_data() function in sound/soc/codecs/tas2781-fmwlib.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

294) Improper error handling

EUVDB-ID: #VU96167

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42279

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the REG_CONTROL2() and mchp_corespi_transfer_one() functions in drivers/spi/spi-microchip-core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

295) Use-after-free

EUVDB-ID: #VU96106

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42280

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the hfcmulti_dtmf() and HFC_wait_nodebug() functions in drivers/isdn/hardware/mISDN/hfcmulti.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

296) Input validation error

EUVDB-ID: #VU96206

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42281

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the bpf_skb_net_grow() function in net/core/filter.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

297) Memory leak

EUVDB-ID: #VU96195

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42283

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the nla_put_nh_group() function in net/ipv4/nexthop.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

298) Buffer overflow

EUVDB-ID: #VU96176

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42284

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the tipc_udp_addr2str() function in net/tipc/udp_media.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

299) Use-after-free

EUVDB-ID: #VU96107

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42285

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the EXPORT_SYMBOL(), destroy_cm_id() and cm_work_handler() functions in drivers/infiniband/core/iwcm.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

300) NULL pointer dereference

EUVDB-ID: #VU96141

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42286

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the qla_nvme_register_remote() function in drivers/scsi/qla2xxx/qla_nvme.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

301) NULL pointer dereference

EUVDB-ID: #VU96140

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42287

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the __qla2x00_abort_all_cmds() function in drivers/scsi/qla2xxx/qla_os.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

302) Buffer overflow

EUVDB-ID: #VU96177

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42288

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the qla2x00_number_of_exch() function in drivers/scsi/qla2xxx/qla_os.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

303) NULL pointer dereference

EUVDB-ID: #VU96139

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42289

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the qla24xx_disable_vp() function in drivers/scsi/qla2xxx/qla_mid.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

304) Resource management error

EUVDB-ID: #VU96181

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42290

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the imx_irqsteer_get_reg_index(), imx_irqsteer_irq_mask() and imx_irqsteer_probe() functions in drivers/irqchip/irq-imx-irqsteer.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

305) Input validation error

EUVDB-ID: #VU96207

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42291

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ice_vc_fdir_reset_cnt_all(), ice_vc_add_fdir_fltr_post(), ice_vc_del_fdir_fltr_post() and ice_vc_add_fdir_fltr() functions in drivers/net/ethernet/intel/ice/ice_virtchnl_fdir.c, within the ice_parse_rx_flow_user_data() function in drivers/net/ethernet/intel/ice/ice_ethtool_fdir.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

306) Out-of-bounds read

EUVDB-ID: #VU96114

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42292

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the zap_modalias_env() function in lib/kobject_uevent.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

307) Improper error handling

EUVDB-ID: #VU96166

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42295

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the nilfs_btree_get_new_block() function in fs/nilfs2/btree.c, within the nilfs_btnode_create_block() function in fs/nilfs2/btnode.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

308) NULL pointer dereference

EUVDB-ID: #VU96138

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42298

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the qmc_audio_dai_parse() function in sound/soc/fsl/fsl_qmc_audio.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

309) Out-of-bounds read

EUVDB-ID: #VU96116

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42301

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the do_active_device(), do_autoprobe(), do_hardware_base_addr(), do_hardware_irq(), do_hardware_dma() and do_hardware_modes() functions in drivers/parport/procfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

310) Use-after-free

EUVDB-ID: #VU96108

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42302

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the pci_bus_max_d3cold_delay() and pci_bridge_wait_for_secondary_bus() functions in drivers/pci/pci.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

311) Input validation error

EUVDB-ID: #VU96208

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42303

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the pxp_probe() function in drivers/media/platform/nxp/imx-pxp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

312) NULL pointer dereference

EUVDB-ID: #VU96136

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42308

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the dc_plane_get_status() function in drivers/gpu/drm/amd/display/dc/core/dc_surface.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

313) NULL pointer dereference

EUVDB-ID: #VU96135

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42309

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the psb_intel_lvds_get_modes() function in drivers/gpu/drm/gma500/psb_intel_lvds.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

314) NULL pointer dereference

EUVDB-ID: #VU96134

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42310

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the cdv_intel_lvds_get_modes() function in drivers/gpu/drm/gma500/cdv_intel_lvds.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

315) Use of uninitialized resource

EUVDB-ID: #VU96172

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42311

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the hfs_new_inode() and hfs_inode_read_fork() functions in fs/hfs/inode.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

316) Input validation error

EUVDB-ID: #VU96209

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42312

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the proc_sys_make_inode() function in fs/proc/proc_sysctl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

317) Use-after-free

EUVDB-ID: #VU96109

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42313

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the vdec_close() function in drivers/media/platform/qcom/venus/vdec.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

318) Use-after-free

EUVDB-ID: #VU96110

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42314

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the add_ra_bio_pages() function in fs/btrfs/compression.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

319) Improper locking

EUVDB-ID: #VU96152

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42315

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the exfat_get_dentry_set() function in fs/exfat/dir.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

320) Integer underflow

EUVDB-ID: #VU96174

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42316

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer underflow within the folio_rotate_reclaimable() function in mm/vmscan.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

321) Input validation error

EUVDB-ID: #VU96210

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42318

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the hook_cred_prepare() and hook_cred_free() functions in security/landlock/cred.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

322) Resource management error

EUVDB-ID: #VU96190

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42319

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the cmdq_probe() function in drivers/mailbox/mtk-cmdq-mailbox.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

323) NULL pointer dereference

EUVDB-ID: #VU96133

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42320

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the dasd_copy_pair_store() function in drivers/s390/block/dasd_devmap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

324) Resource management error

EUVDB-ID: #VU96189

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42322

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the ip_vs_add_service() function in net/netfilter/ipvs/ip_vs_ctl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

325) NULL pointer dereference

EUVDB-ID: #VU96117

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43816

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the lpfc_prep_embed_io() function in drivers/scsi/lpfc/lpfc_sli.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

326) Input validation error

EUVDB-ID: #VU96160

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43817

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the include/linux/virtio_net.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

327) NULL pointer dereference

EUVDB-ID: #VU96131

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43818

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the st_es8336_late_probe() function in sound/soc/amd/acp-es8336.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

328) NULL pointer dereference

EUVDB-ID: #VU96130

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43819

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the kvm_arch_prepare_memory_region() function in arch/s390/kvm/kvm-s390.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

329) NULL pointer dereference

EUVDB-ID: #VU96129

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43821

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the lpfc_xcvr_data_show() function in drivers/scsi/lpfc/lpfc_attr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

330) NULL pointer dereference

EUVDB-ID: #VU96127

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43823

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ks_pcie_setup_rc_app_regs() and ks_pcie_host_init() functions in drivers/pci/controller/dwc/pci-keystone.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

331) NULL pointer dereference

EUVDB-ID: #VU96126

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43824

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the pci_epf_test_core_init() function in drivers/pci/endpoint/functions/pci-epf-test.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

332) Out-of-bounds read

EUVDB-ID: #VU96111

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43825

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the iio_gts_build_avail_time_table() function in drivers/iio/industrialio-gts-helper.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

333) Improper locking

EUVDB-ID: #VU96150

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43826

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the nfs_wb_folio_cancel() and nfs_wb_folio() functions in fs/nfs/write.c, within the nfs_read_folio() function in fs/nfs/read.c, within the nfs_invalidate_folio() and nfs_launder_folio() functions in fs/nfs/file.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

334) NULL pointer dereference

EUVDB-ID: #VU96124

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43829

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the qxl_add_mode() function in drivers/gpu/drm/qxl/qxl_display.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

335) Double free

EUVDB-ID: #VU96162

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43830

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the led_trigger_set() function in drivers/leds/led-triggers.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

336) Input validation error

EUVDB-ID: #VU96196

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43831

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the vpu_dec_init() function in drivers/media/platform/mediatek/vcodec/decoder/vdec_vpu_if.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

337) NULL pointer dereference

EUVDB-ID: #VU96123

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43833

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the v4l2_async_create_ancillary_links() function in drivers/media/v4l2-core/v4l2-async.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

338) Use-after-free

EUVDB-ID: #VU96103

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43834

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the xdp_unreg_mem_model() function in net/core/xdp.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

339) NULL pointer dereference

EUVDB-ID: #VU96121

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43837

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the include/linux/bpf_verifier.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

340) Input validation error

EUVDB-ID: #VU96197

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43839

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the bnad_tx_msix_register() and bnad_rx_msix_register() functions in drivers/net/ethernet/brocade/bna/bnad.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

341) Resource management error

EUVDB-ID: #VU96178

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43840

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the prepare_trampoline() function in arch/arm64/net/bpf_jit_comp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

342) Resource management error

EUVDB-ID: #VU96187

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43841

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the virt_wifi_inform_bss(), virt_wifi_connect() and virt_wifi_connect_complete() functions in drivers/net/wireless/virt_wifi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

343) Input validation error

EUVDB-ID: #VU96198

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43842

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the rtw89_sta_info_get_iter() function in drivers/net/wireless/realtek/rtw89/debug.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

344) Resource management error

EUVDB-ID: #VU96186

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43846

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the objagg_obj_parent_assign() function in lib/objagg.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

345) Input validation error

EUVDB-ID: #VU96199

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43847

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the drivers/net/wireless/ath/ath12k/hw.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

346) Input validation error

EUVDB-ID: #VU96200

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43849

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the pdr_locator_new_server(), pdr_locator_del_server() and pdr_get_domain_list() functions in drivers/soc/qcom/pdr_interface.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

347) Resource management error

EUVDB-ID: #VU96185

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43850

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the bwmon_start() and bwmon_probe() functions in drivers/soc/qcom/icc-bwmon.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

348) Resource management error

EUVDB-ID: #VU96179

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43851

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the DEFINE_PER_CPU_READ_MOSTLY(), xlnx_disable_percpu_irq() and xlnx_event_init_sgi() functions in drivers/soc/xilinx/xlnx_event_manager.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

349) Use-after-free

EUVDB-ID: #VU96104

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43853

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the proc_cpuset_show() function in kernel/cgroup/cpuset.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

350) Memory leak

EUVDB-ID: #VU96099

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43854

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the bio_integrity_prep() function in block/bio-integrity.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

351) Improper locking

EUVDB-ID: #VU96147

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43855

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the md_end_flush(), submit_flushes() and md_submit_flush_data() functions in drivers/md/md.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

352) Buffer overflow

EUVDB-ID: #VU96191

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43856

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the dmam_free_coherent() function in kernel/dma/mapping.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

353) Out-of-bounds read

EUVDB-ID: #VU96113

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43858

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the diSync() and diRead() functions in fs/jfs/jfs_imap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

354) NULL pointer dereference

EUVDB-ID: #VU96118

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43860

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the imx_rproc_addr_init() function in drivers/remoteproc/imx_rproc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

355) Memory leak

EUVDB-ID: #VU96290

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43861

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the qmimux_rx_fixup() function in drivers/net/usb/qmi_wwan.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

356) Improper locking

EUVDB-ID: #VU96297

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43863

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the vmw_fence_obj_destroy(), vmw_fence_obj_init() and vmw_fence_goal_new_locked() functions in drivers/gpu/drm/vmwgfx/vmwgfx_fence.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

357) Memory leak

EUVDB-ID: #VU96289

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43864

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the mlx5_tc_ct_entry_destroy_mod_hdr() function in drivers/net/ethernet/mellanox/mlx5/core/en/tc_ct.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

358) NULL pointer dereference

EUVDB-ID: #VU96293

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43866

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mlx5_sf_dev_shutdown() function in drivers/net/ethernet/mellanox/mlx5/core/sf/dev/driver.c, within the mlx5_try_fast_unload() and shutdown() functions in drivers/net/ethernet/mellanox/mlx5/core/main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

359) Integer underflow

EUVDB-ID: #VU96301

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43867

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer underflow within the nouveau_gem_prime_import_sg_table() function in drivers/gpu/drm/nouveau/nouveau_prime.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

360) Memory leak

EUVDB-ID: #VU96287

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43871

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the EXPORT_SYMBOL_GPL() function in drivers/base/devres.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

361) Improper locking

EUVDB-ID: #VU96294

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43872

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the next_ceqe_sw_v2(), hns_roce_v2_msix_interrupt_eq(), hns_roce_ceq_work(), __hns_roce_request_irq() and __hns_roce_free_irq() functions in drivers/infiniband/hw/hns/hns_roce_hw_v2.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

362) Use of uninitialized resource

EUVDB-ID: #VU96300

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43873

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the vhost_vsock_dev_open() and vhost_vsock_set_features() functions in drivers/vhost/vsock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

363) Use-after-free

EUVDB-ID: #VU96291

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43874

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the __sev_snp_shutdown_locked() function in drivers/crypto/ccp/sev-dev.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

364) Input validation error

EUVDB-ID: #VU96298

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43875

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the vpci_scan_bus() and epf_ntb_bind() functions in drivers/pci/endpoint/functions/pci-epf-vntb.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

365) Resource management error

EUVDB-ID: #VU96303

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43876

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the rcar_pcie_wakeup() function in drivers/pci/controller/pcie-rcar-host.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

366) Buffer overflow

EUVDB-ID: #VU96302

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43877

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the ivtvfb_prep_dec_dma_to_device() function in drivers/media/pci/ivtv/ivtvfb.c, within the ivtv_yuv_prep_user_dma() function in drivers/media/pci/ivtv/ivtv-yuv.c, within the ivtv_udma_setup() function in drivers/media/pci/ivtv/ivtv-udma.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

367) Resource management error

EUVDB-ID: #VU96304

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43879

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the cfg80211_calculate_bitrate_he() function in net/wireless/util.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

368) Resource management error

EUVDB-ID: #VU96305

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43880

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the objagg_hints_obj_cmp() and objagg_hints_get() functions in lib/objagg.c, within the mlxsw_sp_acl_erp_delta_check() and mlxsw_sp_acl_erp_root_destroy() functions in drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_erp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

369) Memory leak

EUVDB-ID: #VU96288

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43881

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ath12k_dp_rx_h_defrag_reo_reinject() and spin_unlock_bh() functions in drivers/net/wireless/ath/ath12k/dp_rx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

370) Improper locking

EUVDB-ID: #VU96295

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43882

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the bprm_fill_uid() function in fs/exec.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

371) Input validation error

EUVDB-ID: #VU96493

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43883

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the vhci_urb_enqueue(), vhci_shutdown_connection() and vhci_device_reset() functions in drivers/usb/usbip/vhci_hcd.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

372) NULL pointer dereference

EUVDB-ID: #VU96538

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43884

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the pair_device() function in net/bluetooth/mgmt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

373) Improper locking

EUVDB-ID: #VU96539

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43885

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the btrfs_release_log_ctx_extents() function in fs/btrfs/file.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

374) Division by zero

EUVDB-ID: #VU96545

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43889

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the padata_do_multithreaded() function in kernel/padata.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

375) Race condition

EUVDB-ID: #VU96546

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43892

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the MEM_CGROUP_ID_MAX(), mem_cgroup_alloc() and mem_cgroup_css_online() functions in mm/memcontrol.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

376) Improper locking

EUVDB-ID: #VU96540

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43893

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the uart_set_info() function in drivers/tty/serial/serial_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

377) NULL pointer dereference

EUVDB-ID: #VU96536

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43894

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the drm_client_modeset_probe() function in drivers/gpu/drm/drm_client_modeset.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

378) NULL pointer dereference

EUVDB-ID: #VU96535

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43895

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the is_dsc_need_re_compute() function in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_mst_types.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

379) Input validation error

EUVDB-ID: #VU96541

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43897

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the __udp_gso_segment() function in net/ipv4/udp_offload.c, within the tcp_gso_segment() function in net/ipv4/tcp_offload.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

380) NULL pointer dereference

EUVDB-ID: #VU96532

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43899

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the dcn20_get_dcc_compression_cap() function in drivers/gpu/drm/amd/display/dc/resource/dcn20/dcn20_resource.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

381) Use-after-free

EUVDB-ID: #VU96515

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43900

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the load_firmware_cb() function in drivers/media/tuners/xc2028.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

382) NULL pointer dereference

EUVDB-ID: #VU96530

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43902

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the dm_suspend(), create_eml_sink() and amdgpu_dm_connector_get_modes() functions in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

383) NULL pointer dereference

EUVDB-ID: #VU96520

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43903

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the handle_cursor_update() function in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_plane.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

384) NULL pointer dereference

EUVDB-ID: #VU96528

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43905

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the vega10_find_dpm_states_clocks_in_dpm_table(), vega10_generate_dpm_level_enable_mask(), vega10_check_states_equal(), vega10_set_sclk_od(), vega10_set_mclk_od(), vega10_odn_update_power_state() and vega10_get_performance_level() functions in drivers/gpu/drm/amd/pm/powerplay/hwmgr/vega10_hwmgr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

385) NULL pointer dereference

EUVDB-ID: #VU96527

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43906

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ta_if_invoke_debugfs_write() function in drivers/gpu/drm/amd/amdgpu/amdgpu_psp_ta.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

386) NULL pointer dereference

EUVDB-ID: #VU96526

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43907

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the vega10_apply_state_adjust_rules() function in drivers/gpu/drm/amd/pm/powerplay/hwmgr/vega10_hwmgr.c, within the smu8_apply_state_adjust_rules() function in drivers/gpu/drm/amd/pm/powerplay/hwmgr/smu8_hwmgr.c, within the smu7_apply_state_adjust_rules() function in drivers/gpu/drm/amd/pm/powerplay/hwmgr/smu7_hwmgr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

387) NULL pointer dereference

EUVDB-ID: #VU96525

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43908

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the amdgpu_ras_interrupt_process_handler() function in drivers/gpu/drm/amd/amdgpu/amdgpu_ras.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

388) NULL pointer dereference

EUVDB-ID: #VU96524

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43909

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the smu7_update_edc_leakage_table() and smu7_hwmgr_backend_init() functions in drivers/gpu/drm/amd/pm/powerplay/hwmgr/smu7_hwmgr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

389) NULL pointer dereference

EUVDB-ID: #VU96523

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43911

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ieee80211_start_tx_ba_session() function in net/mac80211/agg-tx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

390) Input validation error

EUVDB-ID: #VU96548

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43912

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the __nl80211_set_channel() function in net/wireless/nl80211.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

391) Memory leak

EUVDB-ID: #VU96512

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-44931

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the gpiochip_get_desc() function in drivers/gpio/gpiolib.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

392) Out-of-bounds read

EUVDB-ID: #VU96550

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-44938

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the dbDiscardAG() function in fs/jfs/jfs_dmap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

393) NULL pointer dereference

EUVDB-ID: #VU96551

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-44939

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the dtInsert() function in fs/jfs/jfs_dtree.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2

kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2

kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2

kernel-rt_debug: before 6.4.0-150600.10.8.3

kernel-rt: before 6.4.0-150600.10.8.3

kernel-source-rt: before 6.4.0-150600.10.8.3

kernel-devel-rt: before 6.4.0-150600.10.8.3

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel: before 6.4.0-150600.10.8.3

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso: before 6.4.0-150600.10.8.3

kernel-syms-rt: before 6.4.0-150600.10.8.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-optional: before 6.4.0-150600.10.8.3

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt: before 6.4.0-150600.10.8.3

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-debugsource: before 6.4.0-150600.10.8.3

dlm-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3

kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3

gfs2-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-extra: before 6.4.0-150600.10.8.3

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3

kselftests-kmp-rt: before 6.4.0-150600.10.8.3

kernel-rt-devel: before 6.4.0-150600.10.8.3

kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3

kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###