Risk | Low |
Patch available | YES |
Number of vulnerabilities | 393 |
CVE-ID | CVE-2023-52489 CVE-2023-52581 CVE-2023-52668 CVE-2023-52688 CVE-2023-52756 CVE-2023-52766 CVE-2023-52800 CVE-2023-52802 CVE-2023-52859 CVE-2023-52885 CVE-2023-52886 CVE-2023-52887 CVE-2023-52889 CVE-2024-26590 CVE-2024-26631 CVE-2024-26637 CVE-2024-26668 CVE-2024-26669 CVE-2024-26677 CVE-2024-26682 CVE-2024-26683 CVE-2024-26735 CVE-2024-26758 CVE-2024-26767 CVE-2024-26808 CVE-2024-26809 CVE-2024-26812 CVE-2024-26835 CVE-2024-26837 CVE-2024-26849 CVE-2024-26851 CVE-2024-26889 CVE-2024-26920 CVE-2024-26976 CVE-2024-27010 CVE-2024-27011 CVE-2024-27024 CVE-2024-27049 CVE-2024-27050 CVE-2024-27079 CVE-2024-27403 CVE-2024-27433 CVE-2024-27437 CVE-2024-31076 CVE-2024-35855 CVE-2024-35897 CVE-2024-35902 CVE-2024-35913 CVE-2024-35939 CVE-2024-35949 CVE-2024-36270 CVE-2024-36286 CVE-2024-36288 CVE-2024-36489 CVE-2024-36881 CVE-2024-36907 CVE-2024-36929 CVE-2024-36933 CVE-2024-36939 CVE-2024-36970 CVE-2024-36979 CVE-2024-38548 CVE-2024-38563 CVE-2024-38609 CVE-2024-38662 CVE-2024-39476 CVE-2024-39483 CVE-2024-39484 CVE-2024-39486 CVE-2024-39488 CVE-2024-39489 CVE-2024-39491 CVE-2024-39493 CVE-2024-39497 CVE-2024-39499 CVE-2024-39500 CVE-2024-39501 CVE-2024-39505 CVE-2024-39506 CVE-2024-39508 CVE-2024-39509 CVE-2024-39510 CVE-2024-40899 CVE-2024-40900 CVE-2024-40902 CVE-2024-40903 CVE-2024-40904 CVE-2024-40905 CVE-2024-40909 CVE-2024-40910 CVE-2024-40911 CVE-2024-40912 CVE-2024-40913 CVE-2024-40916 CVE-2024-40920 CVE-2024-40921 CVE-2024-40922 CVE-2024-40924 CVE-2024-40926 CVE-2024-40927 CVE-2024-40929 CVE-2024-40930 CVE-2024-40932 CVE-2024-40934 CVE-2024-40936 CVE-2024-40938 CVE-2024-40939 CVE-2024-40941 CVE-2024-40942 CVE-2024-40943 CVE-2024-40944 CVE-2024-40945 CVE-2024-40954 CVE-2024-40956 CVE-2024-40957 CVE-2024-40958 CVE-2024-40959 CVE-2024-40962 CVE-2024-40964 CVE-2024-40967 CVE-2024-40976 CVE-2024-40977 CVE-2024-40978 CVE-2024-40981 CVE-2024-40982 CVE-2024-40984 CVE-2024-40987 CVE-2024-40988 CVE-2024-40989 CVE-2024-40990 CVE-2024-40992 CVE-2024-40994 CVE-2024-40995 CVE-2024-40997 CVE-2024-41000 CVE-2024-41001 CVE-2024-41002 CVE-2024-41004 CVE-2024-41007 CVE-2024-41009 CVE-2024-41010 CVE-2024-41011 CVE-2024-41012 CVE-2024-41015 CVE-2024-41016 CVE-2024-41020 CVE-2024-41022 CVE-2024-41024 CVE-2024-41025 CVE-2024-41028 CVE-2024-41032 CVE-2024-41035 CVE-2024-41036 CVE-2024-41037 CVE-2024-41038 CVE-2024-41039 CVE-2024-41040 CVE-2024-41041 CVE-2024-41044 CVE-2024-41045 CVE-2024-41048 CVE-2024-41049 CVE-2024-41050 CVE-2024-41051 CVE-2024-41056 CVE-2024-41057 CVE-2024-41058 CVE-2024-41059 CVE-2024-41060 CVE-2024-41061 CVE-2024-41062 CVE-2024-41063 CVE-2024-41064 CVE-2024-41065 CVE-2024-41066 CVE-2024-41068 CVE-2024-41069 CVE-2024-41070 CVE-2024-41071 CVE-2024-41072 CVE-2024-41073 CVE-2024-41074 CVE-2024-41075 CVE-2024-41076 CVE-2024-41078 CVE-2024-41079 CVE-2024-41080 CVE-2024-41081 CVE-2024-41084 CVE-2024-41087 CVE-2024-41088 CVE-2024-41089 CVE-2024-41092 CVE-2024-41093 CVE-2024-41094 CVE-2024-41095 CVE-2024-41096 CVE-2024-41097 CVE-2024-41098 CVE-2024-42064 CVE-2024-42069 CVE-2024-42070 CVE-2024-42073 CVE-2024-42074 CVE-2024-42076 CVE-2024-42077 CVE-2024-42079 CVE-2024-42080 CVE-2024-42082 CVE-2024-42085 CVE-2024-42086 CVE-2024-42087 CVE-2024-42089 CVE-2024-42090 CVE-2024-42092 CVE-2024-42093 CVE-2024-42095 CVE-2024-42096 CVE-2024-42097 CVE-2024-42098 CVE-2024-42101 CVE-2024-42104 CVE-2024-42105 CVE-2024-42106 CVE-2024-42107 CVE-2024-42109 CVE-2024-42110 CVE-2024-42113 CVE-2024-42114 CVE-2024-42115 CVE-2024-42117 CVE-2024-42119 CVE-2024-42120 CVE-2024-42121 CVE-2024-42122 CVE-2024-42124 CVE-2024-42125 CVE-2024-42126 CVE-2024-42127 CVE-2024-42130 CVE-2024-42131 CVE-2024-42132 CVE-2024-42133 CVE-2024-42136 CVE-2024-42137 CVE-2024-42138 CVE-2024-42139 CVE-2024-42141 CVE-2024-42142 CVE-2024-42143 CVE-2024-42144 CVE-2024-42145 CVE-2024-42147 CVE-2024-42148 CVE-2024-42152 CVE-2024-42153 CVE-2024-42155 CVE-2024-42156 CVE-2024-42157 CVE-2024-42158 CVE-2024-42159 CVE-2024-42161 CVE-2024-42162 CVE-2024-42223 CVE-2024-42224 CVE-2024-42225 CVE-2024-42226 CVE-2024-42227 CVE-2024-42228 CVE-2024-42229 CVE-2024-42230 CVE-2024-42232 CVE-2024-42236 CVE-2024-42237 CVE-2024-42238 CVE-2024-42239 CVE-2024-42240 CVE-2024-42241 CVE-2024-42244 CVE-2024-42245 CVE-2024-42246 CVE-2024-42247 CVE-2024-42250 CVE-2024-42253 CVE-2024-42259 CVE-2024-42268 CVE-2024-42269 CVE-2024-42270 CVE-2024-42271 CVE-2024-42274 CVE-2024-42276 CVE-2024-42277 CVE-2024-42278 CVE-2024-42279 CVE-2024-42280 CVE-2024-42281 CVE-2024-42283 CVE-2024-42284 CVE-2024-42285 CVE-2024-42286 CVE-2024-42287 CVE-2024-42288 CVE-2024-42289 CVE-2024-42290 CVE-2024-42291 CVE-2024-42292 CVE-2024-42295 CVE-2024-42298 CVE-2024-42301 CVE-2024-42302 CVE-2024-42303 CVE-2024-42308 CVE-2024-42309 CVE-2024-42310 CVE-2024-42311 CVE-2024-42312 CVE-2024-42313 CVE-2024-42314 CVE-2024-42315 CVE-2024-42316 CVE-2024-42318 CVE-2024-42319 CVE-2024-42320 CVE-2024-42322 CVE-2024-43816 CVE-2024-43817 CVE-2024-43818 CVE-2024-43819 CVE-2024-43821 CVE-2024-43823 CVE-2024-43824 CVE-2024-43825 CVE-2024-43826 CVE-2024-43829 CVE-2024-43830 CVE-2024-43831 CVE-2024-43833 CVE-2024-43834 CVE-2024-43837 CVE-2024-43839 CVE-2024-43840 CVE-2024-43841 CVE-2024-43842 CVE-2024-43846 CVE-2024-43847 CVE-2024-43849 CVE-2024-43850 CVE-2024-43851 CVE-2024-43853 CVE-2024-43854 CVE-2024-43855 CVE-2024-43856 CVE-2024-43858 CVE-2024-43860 CVE-2024-43861 CVE-2024-43863 CVE-2024-43864 CVE-2024-43866 CVE-2024-43867 CVE-2024-43871 CVE-2024-43872 CVE-2024-43873 CVE-2024-43874 CVE-2024-43875 CVE-2024-43876 CVE-2024-43877 CVE-2024-43879 CVE-2024-43880 CVE-2024-43881 CVE-2024-43882 CVE-2024-43883 CVE-2024-43884 CVE-2024-43885 CVE-2024-43889 CVE-2024-43892 CVE-2024-43893 CVE-2024-43894 CVE-2024-43895 CVE-2024-43897 CVE-2024-43899 CVE-2024-43900 CVE-2024-43902 CVE-2024-43903 CVE-2024-43905 CVE-2024-43906 CVE-2024-43907 CVE-2024-43908 CVE-2024-43909 CVE-2024-43911 CVE-2024-43912 CVE-2024-44931 CVE-2024-44938 CVE-2024-44939 |
CWE-ID | CWE-362 CWE-401 CWE-667 CWE-119 CWE-125 CWE-416 CWE-476 CWE-388 CWE-366 CWE-20 CWE-190 CWE-399 CWE-835 CWE-825 CWE-404 CWE-908 CWE-191 CWE-415 CWE-200 CWE-843 CWE-617 CWE-682 CWE-369 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
SUSE Real Time Module Operating systems & Components / Operating system SUSE Linux Enterprise Live Patching Operating systems & Components / Operating system SUSE Linux Enterprise Real Time 15 Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system kernel-livepatch-6_4_0-150600_10_8-rt Operating systems & Components / Operating system package or component kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo Operating systems & Components / Operating system package or component kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource Operating systems & Components / Operating system package or component kernel-rt_debug Operating systems & Components / Operating system package or component kernel-rt Operating systems & Components / Operating system package or component kernel-source-rt Operating systems & Components / Operating system package or component kernel-devel-rt Operating systems & Components / Operating system package or component kselftests-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt-extra-debuginfo Operating systems & Components / Operating system package or component reiserfs-kmp-rt Operating systems & Components / Operating system package or component kernel-rt_debug-devel Operating systems & Components / Operating system package or component kernel-rt-devel-debuginfo Operating systems & Components / Operating system package or component reiserfs-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt_debug-devel-debuginfo Operating systems & Components / Operating system package or component gfs2-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt-optional-debuginfo Operating systems & Components / Operating system package or component cluster-md-kmp-rt Operating systems & Components / Operating system package or component kernel-rt_debug-debuginfo Operating systems & Components / Operating system package or component kernel-rt-vdso Operating systems & Components / Operating system package or component kernel-syms-rt Operating systems & Components / Operating system package or component kernel-rt_debug-vdso-debuginfo Operating systems & Components / Operating system package or component kernel-rt-optional Operating systems & Components / Operating system package or component cluster-md-kmp-rt-debuginfo Operating systems & Components / Operating system package or component ocfs2-kmp-rt Operating systems & Components / Operating system package or component dlm-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt-debugsource Operating systems & Components / Operating system package or component dlm-kmp-rt Operating systems & Components / Operating system package or component kernel-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt-vdso-debuginfo Operating systems & Components / Operating system package or component kernel-rt_debug-debugsource Operating systems & Components / Operating system package or component gfs2-kmp-rt Operating systems & Components / Operating system package or component kernel-rt-extra Operating systems & Components / Operating system package or component kernel-rt_debug-livepatch-devel Operating systems & Components / Operating system package or component ocfs2-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kselftests-kmp-rt Operating systems & Components / Operating system package or component kernel-rt-devel Operating systems & Components / Operating system package or component kernel-rt-livepatch-devel Operating systems & Components / Operating system package or component kernel-rt_debug-vdso Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 393 vulnerabilities.
EUVDB-ID: #VU89388
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52489
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the section_deactivate() function in mm/sparse.c. A local user can exploit the race and escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89385
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52581
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform DoS attack on the target system.
The vulnerability exists due memory leak within the nft_trans_gc_space() function in net/netfilter/nf_tables_api.c. A local user can force the system to leak memory and perform denial of service attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91517
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52668
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the btrfs_zone_activate() function in fs/btrfs/zoned.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93803
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52688
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the ath12k_core_qmi_firmware_ready() function in drivers/net/wireless/ath/ath12k/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91307
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52756
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the include/linux/pwm.h. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91086
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52766
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the hci_dma_irq_handler() function in drivers/i3c/master/mipi-i3c-hci/dma.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90071
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52800
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ath11k_htt_pktlog() function in drivers/net/wireless/ath/ath11k/dp_rx.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90536
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52802
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the stm32_adc_probe() function in drivers/iio/adc/stm32-adc-core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90081
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52859
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the hisi_sllc_pmu_probe() function in drivers/perf/hisilicon/hisi_uncore_sllc_pmu.c, within the hisi_pa_pmu_probe() function in drivers/perf/hisilicon/hisi_uncore_pa_pmu.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94326
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52885
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the svc_tcp_listen_data_ready() function in net/sunrpc/svcsock.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94434
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52886
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the get_bMaxPacketSize0(), hub_port_init(), hub_port_connect() and usb_reset_and_verify_device() functions in drivers/usb/core/hub.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95018
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52887
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the j1939_xtp_rx_rts_session_new() function in net/can/j1939/transport.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96132
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52889
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the apparmor_socket_sock_rcv_skb() function in security/apparmor/lsm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90663
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26590
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the z_erofs_do_map_blocks() function in fs/erofs/zmap.c, within the z_erofs_parse_cfgs() function in fs/erofs/decompressor.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91436
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26631
CWE-ID:
CWE-366 - Race Condition within a Thread
Exploit availability: No
DescriptionThe vulnerability allows a local user to manipulate data.
The vulnerability exists due to a data race within the ipv6_mc_down() function in net/ipv6/mcast.c. A local user can manipulate data.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93692
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26637
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ath11k_mac_op_add_interface() and ath11k_mac_txpower_recalc() functions in drivers/net/wireless/ath/ath11k/mac.c, within the ath11k_debugfs_add_interface() function in drivers/net/wireless/ath/ath11k/debugfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91180
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26668
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the nft_limit_eval() and nft_limit_init() functions in net/netfilter/nft_limit.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90010
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26669
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the fl_tmplt_destroy() function in net/sched/cls_flower.c, within the tcf_block_playback_offloads() and tc_chain_tmplt_add() functions in net/sched/cls_api.c, within the void() function in include/net/sch_generic.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94139
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26677
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the rxrpc_propose_delay_ACK(), rxrpc_send_initial_ping() and rxrpc_input_call_event() functions in net/rxrpc/call_event.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94141
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26682
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ieee80211_mgd_csa_present(), ieee80211_mgd_auth() and ieee80211_mgd_assoc() functions in net/mac80211/mlme.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93177
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26683
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the cfg80211_update_hidden_bsses() and cfg80211_update_known_bss() functions in net/wireless/scan.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90215
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26735
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the seg6_init() function in net/ipv6/seg6.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93873
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26758
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources in drivers/md/md.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91415
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26767
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the link_validate_dpia_bandwidth() function in drivers/gpu/drm/amd/display/dc/link/link_validation.c, within the get_firmware_info_v3_2(), get_integrated_info_v11(), get_integrated_info_v2_1() and get_integrated_info_v2_2() functions in drivers/gpu/drm/amd/display/dc/bios/bios_parser2.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93809
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26808
CWE-ID:
CWE-825 - Expired pointer dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a stale reference within the nf_tables_netdev_event() function in net/netfilter/nft_chain_filter.c. A local user can perform a denial of service (DoS) attack.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93747
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26809
CWE-ID:
CWE-404 - Improper Resource Shutdown or Release
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to failure to properly release resources within the nft_pipapo_destroy() function in net/netfilter/nft_set_pipapo.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91529
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26812
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the vfio_send_intx_eventfd(), vfio_intx_handler() and vfio_pci_set_intx_trigger() functions in drivers/vfio/pci/vfio_pci_intrs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93772
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26835
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the nf_tables_updtable() function in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92039
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26837
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the switchdev_obj_eq() and switchdev_port_obj_del() functions in net/switchdev/switchdev.c, within the br_switchdev_mdb_replay_one() and br_switchdev_mdb_replay() functions in net/bridge/br_switchdev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90875
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26849
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the sizeof() function in lib/nlattr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91096
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26851
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the decode_seq() function in net/netfilter/nf_conntrack_h323_asn1.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91312
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26889
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the hci_get_dev_info() function in net/bluetooth/hci_core.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93805
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26920
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the register_snapshot_trigger() function in kernel/trace/trace_events_trigger.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90774
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26976
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the async_pf_execute(), kvm_clear_async_pf_completion_queue(), kvm_check_async_pf_completion() and kvm_setup_async_pf() functions in virt/kvm/async_pf.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90769
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27010
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the qdisc_alloc() function in net/sched/sch_generic.c, within the qdisc_run_end() function in net/core/dev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90463
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27011
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the nft_data_hold() and __nf_tables_abort() functions in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93841
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27024
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the rds_sendmsg() function in net/rds/send.c, within the __rds_rdma_map() function in net/rds/rdma.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90179
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27049
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the mt7925_pci_remove() function in drivers/net/wireless/mediatek/mt76/mt7925/pci.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91094
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27050
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the bpf_xdp_query() function in tools/lib/bpf/netlink.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90518
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27079
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the intel_pasid_setup_nested() function in drivers/iommu/intel/pasid.c, within the domain_context_clear() and intel_iommu_release_device() functions in drivers/iommu/intel/iommu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91669
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27403
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the flow_offload_dst_cookie() and nft_flow_dst_release() functions in net/netfilter/nf_flow_table_core.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90924
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27433
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the clk_mt7622_apmixed_remove() function in drivers/clk/mediatek/clk-mt7622-apmixedsys.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93202
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27437
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the vfio_intx_set_signal() function in drivers/vfio/pci/vfio_pci_intrs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93016
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-31076
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the migrate_one_irq() function in kernel/irq/cpuhotplug.c, within the __send_cleanup_vector(), irq_complete_move() and irq_force_complete_move() functions in arch/x86/kernel/apic/vector.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90163
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35855
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the mlxsw_sp_acl_tcam_ventry_activity_get() function in drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_tcam.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93269
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35897
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the nf_tables_table_disable() and nf_tables_updtable() functions in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91234
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35902
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __rds_rdma_map() function in net/rds/rdma.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93191
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35913
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the iwl_mvm_rx_session_protect_notif() function in drivers/net/wireless/intel/iwlwifi/mvm/time-event.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91344
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35939
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information disclosure within the dma_direct_alloc(), __dma_direct_free_pages() and dma_direct_alloc_pages() functions in kernel/dma/direct.c. A local user can gain access to sensitive information.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91391
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35949
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the __btrfs_check_leaf() and __btrfs_check_node() functions in fs/btrfs/tree-checker.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93028
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36270
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the nf_tproxy_laddr4() function in net/ipv4/netfilter/nf_tproxy_ipv4.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93036
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36286
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the instance_destroy_rcu() function in net/netfilter/nfnetlink_queue.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93062
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36288
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the gss_read_proxy_verf() function in net/sunrpc/auth_gss/svcauth_gss.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93030
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36489
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the tls_ctx_create() function in net/tls/tls_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90847
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36881
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the userfaultfd_release() function in fs/userfaultfd.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90381
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36907
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the xs_tcp_tls_setup_socket() function in net/sunrpc/xprtsock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93449
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36929
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the skb_alloc_rx_flag() and skb_copy_expand() functions in net/core/skbuff.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90862
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36933
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the EXPORT_SYMBOL_GPL() and nsh_gso_segment() functions in net/nsh/nsh.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92054
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36939
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the nfs_net_init() function in fs/nfs/inode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91562
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36970
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the iwl_req_fw_callback() function in drivers/net/wireless/intel/iwlwifi/iwl-drv.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92305
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36979
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the br_mst_vlan_set_state() and br_mst_set_state() functions in net/bridge/br_mst.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92349
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38548
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cdns_mhdp_atomic_enable() function in drivers/gpu/drm/bridge/cadence/cdns-mhdp8546-core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92295
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38563
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the mt7996_mcu_get_temperature() function in drivers/net/wireless/mediatek/mt76/mt7996/mcu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93007
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38609
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __mt76_connac_mcu_alloc_sta_req() function in drivers/net/wireless/mediatek/mt76/mt76_connac_mcu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93033
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38662
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the may_update_sockmap() and check_map_func_compatibility() functions in kernel/bpf/verifier.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93824
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39476
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the raid5d() function in drivers/md/raid5.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93825
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39483
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the svm_enable_nmi_window() function in arch/x86/kvm/svm/svm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93818
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39484
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the davinci_mmcsd_remove() and __exit_p() functions in drivers/mmc/host/davinci_mmc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93834
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39486
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the drm_file_update_pid() function in drivers/gpu/drm/drm_file.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94087
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39488
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the arch/arm64/include/asm/asm-bug.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94084
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39489
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the seg6_hmac_init_algo() and seg6_hmac_net_init() functions in net/ipv6/seg6_hmac.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94088
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39491
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the cs35l56_hda_unbind(), cs35l56_hda_common_probe() and cs35l56_hda_remove() functions in sound/pci/hda/cs35l56_hda.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94086
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39493
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the adf_device_reset_worker() and adf_dev_aer_schedule_reset() functions in drivers/crypto/qat/qat_common/adf_aer.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94313
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39497
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the drm_gem_shmem_mmap() function in drivers/gpu/drm/drm_gem_shmem_helper.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94201
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39499
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the event_deliver() function in drivers/misc/vmw_vmci/vmci_event.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94262
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39500
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the sock_map_close() function in net/core/sock_map.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94277
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39501
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the uevent_show() function in drivers/base/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94259
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39505
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the komeda_component_get_avail_scaler() function in drivers/gpu/drm/arm/display/komeda/komeda_pipeline_state.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94258
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39506
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the lio_vf_rep_copy_packet() function in drivers/net/ethernet/cavium/liquidio/lio_vf_rep.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94229
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39508
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the WORKER_IDLE_TIMEOUT(), io_work_get_acct(), io_worker_exit(), io_wq_dec_running(), __io_worker_busy(), io_wq_worker(), io_wq_worker_running(), io_wq_worker_sleeping(), io_init_new_worker(), init_completion() and io_wq_work_match_item() functions in io_uring/io-wq.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94310
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39509
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the implement() function in drivers/hid/hid-core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94228
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39510
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cachefiles_ondemand_daemon_read() function in fs/cachefiles/ondemand.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94227
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40899
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cachefiles_req_put(), cachefiles_ondemand_daemon_read() and cachefiles_ondemand_send_req() functions in fs/cachefiles/ondemand.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94226
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40900
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cachefiles_flush_reqs() function in fs/cachefiles/daemon.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94296
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40902
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the ea_get() function in fs/jfs/xattr.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94225
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40903
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the tcpm_register_sink_caps() function in drivers/usb/typec/tcpm/tcpm.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94283
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40904
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the wdm_int_callback() function in drivers/usb/class/cdc-wdm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94257
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40905
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the rt6_get_pcpu_route() function in net/ipv6/route.c, within the __fib6_drop_pcpu_from() function in net/ipv6/ip6_fib.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94224
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40909
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the bpf_obj_get(), bpf_link_defer_dealloc_mult_rcu_gp() and bpf_link_free() functions in kernel/bpf/syscall.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94203
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40910
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ax25_accept() function in net/ax25/af_ax25.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94256
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40911
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cfg80211_get_station() function in net/wireless/util.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94282
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40912
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ieee80211_sta_ps_deliver_wakeup() function in net/mac80211/sta_info.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94214
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40913
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cachefiles_req_put(), cachefiles_ondemand_restore(), cachefiles_ondemand_get_fd() and cachefiles_ondemand_daemon_read() functions in fs/cachefiles/ondemand.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94281
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40916
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the hdmi_get_modes() function in drivers/gpu/drm/exynos/exynos_hdmi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94221
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40920
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the br_mst_set_state() function in net/bridge/br_mst.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94253
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40921
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the br_mst_get_state(), br_mst_set_state() and br_mst_vlan_sync_state() functions in net/bridge/br_mst.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94279
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40922
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the io_rsrc_ref_quiesce() function in io_uring/rsrc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94314
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40924
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the drivers/gpu/drm/i915/gem/i915_gem_object.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94292
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40926
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the nouveau_display_hpd_resume(), nouveau_display_fini() and nouveau_display_create() functions in drivers/gpu/drm/nouveau/nouveau_display.c, within the nv50_display_fini() function in drivers/gpu/drm/nouveau/dispnv50/disp.c, within the nv04_display_fini() function in drivers/gpu/drm/nouveau/dispnv04/disp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94220
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40927
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the xhci_invalidate_cancelled_tds() and xhci_handle_cmd_set_deq() functions in drivers/usb/host/xhci-ring.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94234
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40929
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the iwl_mvm_scan_umac_dwell() and iwl_mvm_scan_umac_dwell_v10() functions in drivers/net/wireless/intel/iwlwifi/mvm/scan.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94285
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40930
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the cfg80211_6ghz_power_type_valid() function in net/wireless/scan.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94204
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40932
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the vidi_get_modes() function in drivers/gpu/drm/exynos/exynos_drm_vidi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94205
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40934
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the logi_dj_recv_switch_to_dj_mode() function in drivers/hid/hid-logitech-dj.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94206
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40936
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the devm_cxl_add_region() and __create_region() functions in drivers/cxl/core/region.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94320
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40938
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the current_check_refer_path() function in security/landlock/fs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94321
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40939
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ipc_devlink_create_region() function in drivers/net/wwan/iosm/iosm_ipc_devlink.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94315
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40941
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the iwl_mvm_mfu_assert_dump_notif() function in drivers/net/wireless/intel/iwlwifi/mvm/fw.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94207
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40942
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the mesh_path_discard_frame() function in net/mac80211/mesh_pathtbl.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94278
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40943
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __ocfs2_change_file_space() function in fs/ocfs2/file.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94317
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40944
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the machine_kexec_cleanup() and machine_kexec() functions in arch/x86/kernel/machine_kexec_64.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94250
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40945
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the include/linux/iommu.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94217
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40954
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the sk_common_release() function in net/core/sock.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94216
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40956
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the irq_process_work_list() function in drivers/dma/idxd/irq.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94247
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40957
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the input_action_end_dx6() and input_action_end_dx4() functions in net/ipv6/seg6_local.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94215
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40958
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the EXPORT_SYMBOL_GPL() function in net/core/net_namespace.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94246
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40959
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the xfrm6_get_saddr() function in net/ipv6/xfrm6_policy.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94243
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40962
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the btrfs_submit_chunk() function in fs/btrfs/bio.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94242
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40964
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cs35l41_hda_unbind() function in sound/pci/hda/cs35l41_hda.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94274
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40967
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the imx_uart_console_write() function in drivers/tty/serial/imx.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94297
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40976
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the lima_sched_timedout_job() function in drivers/gpu/drm/lima/lima_sched.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94271
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40977
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the mt76s_tx_status_data() function in drivers/net/wireless/mediatek/mt76/sdio.c, within the mt7921s_mac_reset() function in drivers/net/wireless/mediatek/mt76/mt7921/sdio_mac.c, within the mt7921e_mac_reset() function in drivers/net/wireless/mediatek/mt76/mt7921/pci_mac.c, within the mt7921_mac_reset_work() function in drivers/net/wireless/mediatek/mt76/mt7921/mac.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94299
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40978
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the qedi_dbg_do_not_recover_cmd_read() function in drivers/scsi/qedi/qedi_debugfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94269
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40981
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the batadv_purge_orig_ref() function in net/batman-adv/originator.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94240
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40982
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ssb_bus_match() function in drivers/ssb/main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94239
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40984
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the acpi_ex_system_memory_space_handler() function in drivers/acpi/acpica/exregion.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94307
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40987
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the sumo_construct_vid_mapping_table() function in drivers/gpu/drm/amd/amdgpu/kv_dpm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94308
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40988
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the sumo_construct_vid_mapping_table() function in drivers/gpu/drm/radeon/sumo_dpm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94324
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40989
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the vgic_v3_free_redist_region() and vgic_v3_set_redist_base() functions in arch/arm64/kvm/vgic/vgic-mmio-v3.c, within the kvm_vgic_dist_destroy() function in arch/arm64/kvm/vgic/vgic-init.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94325
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40990
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the mlx5_ib_create_srq() function in drivers/infiniband/hw/mlx5/srq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94302
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40992
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the rxe_resp_check_length() function in drivers/infiniband/sw/rxe/rxe_resp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94294
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40994
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the max_vclocks_store() function in drivers/ptp/ptp_sysfs.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94267
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40995
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the tcf_idr_check_alloc() and rcu_read_unlock() functions in net/sched/act_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94210
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40997
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the amd_pstate_epp_cpu_exit() function in drivers/cpufreq/amd-pstate.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94295
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41000
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the blkpg_do_ioctl() function in block/ioctl.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94211
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41001
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the io_sq_thread() function in io_uring/sqpoll.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94212
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41002
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the sec_alg_resource_free() function in drivers/crypto/hisilicon/sec2/sec_crypto.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94265
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41004
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the kernel/trace/Kconfig. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94345
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41007
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the tcp_rtx_probe0_timed_out() function in net/ipv4/tcp_timer.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94508
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41009
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the __aligned(), bpf_ringbuf_alloc(), bpf_ringbuf_restore_from_rec() and __bpf_ringbuf_reserve() functions in kernel/bpf/ringbuf.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94507
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41010
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ingress_init(), ingress_destroy(), clsact_init() and clsact_destroy() functions in net/sched/sch_ingress.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94530
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41011
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the kfd_ioctl_alloc_memory_of_gpu(), criu_restore_memory_of_gpu() and kfd_mmio_mmap() functions in drivers/gpu/drm/amd/amdkfd/kfd_chardev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94672
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41012
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the fcntl_setlk() function in fs/locks.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94842
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41015
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ocfs2_check_dir_entry(), ocfs2_search_dirblock(), __ocfs2_delete_entry(), __ocfs2_add_entry(), ocfs2_dir_foreach_blk_id(), ocfs2_dir_foreach_blk_el(), ocfs2_find_dir_space_id() and ocfs2_find_dir_space_el() functions in fs/ocfs2/dir.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94837
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41016
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ocfs2_xattr_find_entry() function in fs/ocfs2/xattr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94996
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41020
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the fcntl_setlk64() function in fs/locks.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95022
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41022
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the sdma_v4_0_process_trap_irq() function in drivers/gpu/drm/amd/amdgpu/sdma_v4_0.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95105
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41024
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the is_attach_rejected() and fastrpc_device_ioctl() functions in drivers/misc/fastrpc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94925
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41025
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the fastrpc_init_create_static_process() function in drivers/misc/fastrpc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94954
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41028
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the drivers/platform/x86/toshiba_acpi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95079
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41032
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the DEFINE_PER_CPU() function in mm/vmalloc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95109
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41035
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the usb_parse_endpoint() function in drivers/usb/core/config.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94995
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41036
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ks8851_tx_work() function in drivers/net/ethernet/micrel/ks8851_spi.c, within the ks8851_irq() and ks8851_set_rx_mode() functions in drivers/net/ethernet/micrel/ks8851_common.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94975
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41037
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the hda_dai_suspend() function in sound/soc/sof/intel/hda-dai.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95048
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41038
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the cs_dsp_coeff_parse_string(), cs_dsp_coeff_parse_int(), cs_dsp_coeff_parse_coeff() and cs_dsp_parse_coeff() functions in drivers/firmware/cirrus/cs_dsp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95042
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41039
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the cs_dsp_adsp1_parse_sizes(), cs_dsp_adsp2_parse_sizes(), cs_dsp_load() and cs_dsp_buf_free() functions in drivers/firmware/cirrus/cs_dsp.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94949
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41040
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the net/sched/act_ct.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95069
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41041
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the sock_set_flag() and spin_unlock() functions in net/ipv4/udp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95108
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41044
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ppp_read() and ppp_write() functions in drivers/net/ppp/ppp_generic.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94948
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41045
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the bpf_timer_delete_work(), __bpf_async_init() and __bpf_spin_unlock_irqrestore() functions in kernel/bpf/helpers.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94982
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41048
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the sk_msg_recvmsg() function in net/core/skmsg.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94947
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41049
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the posix_lock_inode() function in fs/locks.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94993
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41050
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the cachefiles_ondemand_send_req() function in fs/cachefiles/ondemand.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94946
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41051
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cachefiles_ondemand_clean_object() function in fs/cachefiles/ondemand.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95107
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41056
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the cs_dsp_coeff_parse_alg() and cs_dsp_coeff_parse_coeff() functions in drivers/firmware/cirrus/cs_dsp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94945
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41057
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cachefiles_free_volume() function in fs/cachefiles/volume.c, within the cachefiles_withdraw_objects() and cachefiles_withdraw_cache() functions in fs/cachefiles/cache.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94944
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41058
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cachefiles_withdraw_volumes() function in fs/cachefiles/cache.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95033
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41059
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the hfsplus_listxattr() function in fs/hfsplus/xattr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94978
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41060
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the radeon_gem_va_update_vm() function in drivers/gpu/drm/radeon/radeon_gem.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94955
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41061
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the dml2_calculate_rq_and_dlg_params() function in drivers/gpu/drm/amd/display/dc/dml2/dml2_utils.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94977
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41062
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the l2cap_sock_kill(), l2cap_sock_new_connection_cb() and l2cap_sock_recv_cb() functions in net/bluetooth/l2cap_sock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94992
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41063
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the hci_unregister_dev() function in net/bluetooth/hci_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94991
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41064
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the eeh_pe_bus_get() function in arch/powerpc/kernel/eeh_pe.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94926
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41065
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the alloc_dispatch_log_kmem_cache() function in arch/powerpc/platforms/pseries/setup.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94927
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41066
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ibmvnic_xmit() function in drivers/net/ethernet/ibm/ibmvnic.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95072
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41068
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the sclp_init() function in drivers/s390/char/sclp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94943
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41069
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the soc_tplg_dapm_graph_elems_load() function in sound/soc/soc-topology.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94942
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41070
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the kvm_spapr_tce_attach_iommu_group() function in arch/powerpc/kvm/book3s_64_vio.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94956
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41071
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ieee80211_prep_hw_scan() function in net/mac80211/scan.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95106
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41072
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the cfg80211_wext_siwscan() function in net/wireless/scan.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95011
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41073
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the nvme_cleanup_cmd() function in drivers/nvme/host/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95087
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41074
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the cachefiles_ondemand_copen() function in fs/cachefiles/ondemand.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95004
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41075
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the cachefiles_ondemand_fd_llseek(), cachefiles_ondemand_fd_ioctl() and cachefiles_ondemand_copen() functions in fs/cachefiles/ondemand.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94928
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41076
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the nfs4_set_security_label() function in fs/nfs/nfs4proc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94929
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41078
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the btrfs_quota_disable() function in fs/btrfs/qgroup.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94930
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41079
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the nvmet_execute_admin_connect() and nvmet_execute_io_connect() functions in drivers/nvme/target/fabrics-cmd.c, within the pr_debug() and nvmet_execute_auth_receive() functions in drivers/nvme/target/fabrics-cmd-auth.c, within the nvmet_req_init() function in drivers/nvme/target/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94990
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41080
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the io_register_iowq_max_workers() function in io_uring/register.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95051
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41081
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ila_output() function in net/ipv6/ila/ila_lwt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94973
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41084
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __cxl_dpa_to_region() function in drivers/cxl/core/region.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95008
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41087
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the ata_host_alloc() function in drivers/ata/libata-core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94989
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41088
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the mcp251xfd_tx_obj_from_skb(), mcp251xfd_tx_busy() and mcp251xfd_start_xmit() functions in drivers/net/can/spi/mcp251xfd/mcp251xfd-tx.c, within the mcp251xfd_open() and mcp251xfd_stop() functions in drivers/net/can/spi/mcp251xfd/mcp251xfd-core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94971
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41089
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the nv17_tv_get_hd_modes() function in drivers/gpu/drm/nouveau/dispnv04/tvnv17.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94938
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41092
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the i915_vma_revoke_fence() function in drivers/gpu/drm/i915/gt/intel_ggtt_fencing.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95019
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41093
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the amdgpu_vkms_prepare_fb() and amdgpu_vkms_cleanup_fb() functions in drivers/gpu/drm/amd/amdgpu/amdgpu_vkms.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95056
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41094
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the drm_fbdev_dma_helper_fb_probe() function in drivers/gpu/drm/drm_fbdev_dma.c, within the drm_fb_helper_alloc_info() and __drm_fb_helper_initial_config_and_unlock() functions in drivers/gpu/drm/drm_fb_helper.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94966
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41095
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the nv17_tv_get_ld_modes() function in drivers/gpu/drm/nouveau/dispnv04/tvnv17.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94941
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41096
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the msi_capability_init() function in drivers/pci/msi/msi.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95067
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41097
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the cxacru_bind() function in drivers/usb/atm/cxacru.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94970
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41098
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ata_host_release() function in drivers/ata/libata-core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95084
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42064
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the dml2_calculate_rq_and_dlg_params() and dml2_verify_det_buffer_configuration() functions in drivers/gpu/drm/amd/display/dc/dml2/dml2_utils.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95009
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42069
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the add_adev() function in drivers/net/ethernet/microsoft/mana/mana_en.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94923
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42070
CWE-ID:
CWE-843 - Type confusion
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to a type confusion error within the nft_lookup_init() function in net/netfilter/nft_lookup.c,
within the nf_tables_fill_setelem() and nft_validate_register_store()
functions in net/netfilter/nf_tables_api.c. A local user can pass specially crafted data to the packet filtering to trigger a type confusion error and gain access to sensitive information.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94940
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42073
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the mlxsw_sp_sb_sr_occ_query_cb(), mlxsw_reg_sbsr_pack() and mlxsw_sp_sb_occ_max_clear() functions in drivers/net/ethernet/mellanox/mlxsw/spectrum_buffers.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94969
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42074
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the snd_acp_resume() function in sound/soc/amd/acp/acp-pci.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95031
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42076
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the MODULE_ALIAS() and j1939_send_one() functions in net/can/j1939/main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95068
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42077
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ocfs2_extend_trans() function in fs/ocfs2/journal.c, within the ocfs2_dio_end_io_write() function in fs/ocfs2/aops.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94968
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42079
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the gfs2_jindex_free() function in fs/gfs2/super.c, within the lops_before_commit() function in fs/gfs2/log.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95103
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42080
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the rdma_restrack_init() and type2str() functions in drivers/infiniband/core/restrack.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95055
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42082
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the __xdp_reg_mem_model() function in net/core/xdp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94965
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42085
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dwc3_suspend_common() and dwc3_resume_common() functions in drivers/usb/dwc3/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95041
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42086
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the bme680_compensate_temp(), bme680_compensate_press() and bme680_compensate_humid() functions in drivers/iio/chemical/bme680_core.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95066
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42087
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ili9881c_prepare() and ili9881c_unprepare() functions in drivers/gpu/drm/panel/panel-ilitek-ili9881c.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94964
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42089
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the fsl_asoc_card_probe() function in sound/soc/fsl/fsl-asoc-card.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94988
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42090
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the create_pinctrl() function in drivers/pinctrl/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95000
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42092
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the davinci_gpio_probe() function in drivers/gpio/gpio-davinci.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95039
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42093
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the dpaa2_eth_xdp_xmit() and update_xps() functions in drivers/net/ethernet/freescale/dpaa2/dpaa2-eth.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95101
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42095
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the uart_write() and omap8250_irq() functions in drivers/tty/serial/8250/8250_omap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94987
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42096
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the profile_pc() function in arch/x86/kernel/time.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95001
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42097
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the load_data() and load_guspatch() functions in sound/synth/emux/soundfont.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95100
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42098
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ecdh_set_secret() function in crypto/ecdh.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94963
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42101
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the nouveau_connector_get_modes() function in drivers/gpu/drm/nouveau/nouveau_connector.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94937
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42104
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nilfs_check_page() and nilfs_error() functions in fs/nilfs2/dir.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94936
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42105
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nilfs_store_disk_layout() function in fs/nilfs2/the_nilfs.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95024
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42106
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the inet_diag_dump_compat() and inet_diag_get_exact_compat() functions in net/ipv4/inet_diag.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94962
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42107
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ice_ptp_extts_event() function in drivers/net/ethernet/intel/ice/ice_ptp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94934
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42109
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nft_rcv_nl_event() function in net/netfilter/nf_tables_api.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95050
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42110
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ntb_netdev_rx_handler() function in drivers/net/ntb_netdev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95025
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42113
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the wx_set_interrupt_capability() function in drivers/net/ethernet/wangxun/libwx/wx_lib.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94986
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42114
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the NLA_POLICY_FULL_RANGE() function in net/wireless/nl80211.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94932
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42115
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the jffs2_i_init_once() function in fs/jffs2/super.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95005
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42117
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to reachable assertion within the find_disp_cfg_idx_by_plane_id() and find_disp_cfg_idx_by_stream_id() functions in drivers/gpu/drm/amd/display/dc/dml2/dml2_dc_resource_mgmt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95015
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42119
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the find_first_free_audio() function in drivers/gpu/drm/amd/display/dc/core/dc_resource.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95099
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42120
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the dce110_vblank_set() function in drivers/gpu/drm/amd/display/dc/irq/dce110/irq_service_dce110.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95098
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42121
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the read() and write() functions in drivers/gpu/drm/amd/display/modules/hdcp/hdcp_ddc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94961
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42122
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn31_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn351/dcn351_resource.c, within the dcn31_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn35/dcn35_resource.c, within the dcn321_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn321/dcn321_resource.c, within the dcn32_hpo_dp_link_encoder_create() and dml1_validate() functions in drivers/gpu/drm/amd/display/dc/resource/dcn32/dcn32_resource.c, within the dcn31_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn316/dcn316_resource.c, within the dcn31_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn315/dcn315_resource.c, within the dcn31_hpo_dp_link_encoder_create() and dcn314_validate_bandwidth() functions in drivers/gpu/drm/amd/display/dc/resource/dcn314/dcn314_resource.c, within the dcn31_hpo_dp_link_encoder_create() and dcn31_validate_bandwidth() functions in drivers/gpu/drm/amd/display/dc/resource/dcn31/dcn31_resource.c, within the dcn30_validate_bandwidth() function in drivers/gpu/drm/amd/display/dc/resource/dcn30/dcn30_resource.c, within the dcn32_clk_mgr_construct() function in drivers/gpu/drm/amd/display/dc/clk_mgr/dcn32/dcn32_clk_mgr.c, within the dcn3_clk_mgr_construct() function in drivers/gpu/drm/amd/display/dc/clk_mgr/dcn30/dcn30_clk_mgr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95097
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42124
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the qedf_execute_tmf() function in drivers/scsi/qedf/qedf_io.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95081
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42125
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the rtw89_scan_get_6g_disabled_chan() function in drivers/net/wireless/realtek/rtw89/fw.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94997
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42126
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the pcpu_cpu_to_node() and setup_per_cpu_areas() functions in arch/powerpc/kernel/setup_64.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95014
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42127
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the lima_pp_init() and lima_pp_bcast_init() functions in drivers/gpu/drm/lima/lima_pp.c, within the lima_mmu_init() function in drivers/gpu/drm/lima/lima_mmu.c, within the lima_gp_init() function in drivers/gpu/drm/lima/lima_gp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95075
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42130
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the virtual_ncidev_write() function in drivers/nfc/virtual_ncidev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95035
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42131
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the domain_dirty_limits(), node_dirty_limit(), dirty_background_bytes_handler() and dirty_bytes_handler() functions in mm/page-writeback.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95060
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42132
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the hci_conn_hash_alloc_unset() and hci_conn_add_unset() functions in net/bluetooth/hci_conn.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95096
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42133
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the hci_le_big_sync_established_evt() function in net/bluetooth/hci_event.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95036
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42136
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the cdrom_ioctl_timed_media_change() function in drivers/cdrom/cdrom.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94931
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42137
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the qca_serdev_shutdown() function in drivers/bluetooth/hci_qca.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94959
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42138
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the vfree() function in drivers/net/ethernet/mellanox/mlxsw/core_linecards.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95082
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42139
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ice_ptp_extts_event(), ice_ptp_cfg_extts(), ice_ptp_gpio_enable_e810(), ice_ptp_gpio_enable_e823(), ice_ptp_rebuild_owner() and ice_ptp_release() functions in drivers/net/ethernet/intel/ice/ice_ptp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94984
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42141
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the iso_sock_recvmsg() function in net/bluetooth/iso.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95083
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42142
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the acl_ingress_ofld_setup(), esw_acl_ingress_src_port_drop_create(), esw_acl_ingress_ofld_groups_destroy() and esw_acl_ingress_ofld_setup() functions in drivers/net/ethernet/mellanox/mlx5/core/esw/acl/ingress_ofld.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94951
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42143
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the orangefs_statfs() function in fs/orangefs/super.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94958
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42144
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the lvts_probe() function in drivers/thermal/mediatek/lvts_thermal.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95054
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42145
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the MODULE_AUTHOR(), __get_agent(), send_handler(), recv_handler() and ib_umad_read() functions in drivers/infiniband/core/user_mad.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95094
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42147
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the dfx_regs_uninit(), qm_diff_regs_init() and qm_last_regs_init() functions in drivers/crypto/hisilicon/debugfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94952
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42148
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the drivers/net/ethernet/broadcom/bnx2x/bnx2x.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94922
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42152
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the nvmet_sq_destroy() function in drivers/nvme/target/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94983
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42153
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the wait_reset(), i2c_pnx_master_xmit(), i2c_pnx_master_rcv(), i2c_pnx_interrupt(), i2c_pnx_timeout(), i2c_pnx_xfer() and i2c_pnx_probe() functions in drivers/i2c/busses/i2c-pnx.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95092
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42155
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the pkey_unlocked_ioctl() function in drivers/s390/crypto/pkey_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95091
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42156
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the pkey_unlocked_ioctl() function in drivers/s390/crypto/pkey_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95090
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42157
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the pkey_unlocked_ioctl() function in drivers/s390/crypto/pkey_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95064
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42158
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the pkey_unlocked_ioctl() function in drivers/s390/crypto/pkey_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95089
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42159
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the mpi3mr_sas_port_add() function in drivers/scsi/mpi3mr/mpi3mr_transport.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95027
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42161
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the tools/lib/bpf/bpf_core_read.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95074
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42162
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the gve_get_drvinfo() and gve_get_ethtool_stats() functions in drivers/net/ethernet/google/gve/gve_ethtool.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95037
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42223
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the tda10048_set_if() function in drivers/media/dvb-frontends/tda10048.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95012
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42224
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the mv88e6xxx_default_mdio_bus() function in drivers/net/dsa/mv88e6xxx/chip.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95028
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42225
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the mt7915_mcu_add_nested_subtlv() function in drivers/net/wireless/mediatek/mt76/mt7915/mcu.c, within the mt76_connac_mcu_add_nested_tlv(), mt76_connac_mcu_hw_scan(), mt76_connac_mcu_sched_scan_req(), mt76_connac_mcu_update_gtk_rekey() and mt76_connac_mcu_set_wow_pattern() functions in drivers/net/wireless/mediatek/mt76/mt76_connac_mcu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95063
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42226
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the handle_tx_event() function in drivers/usb/host/xhci-ring.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95088
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42227
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the dml_core_mode_programming() function in drivers/gpu/drm/amd/display/dc/dml2/display_mode_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95029
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42228
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the amdgpu_vce_ring_parse_cs() function in drivers/gpu/drm/amd/amdgpu/amdgpu_vce.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95078
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42229
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the setkey_unaligned() function in crypto/cipher.c, within the setkey_unaligned() function in crypto/aead.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95062
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42230
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the define_machine() function in arch/powerpc/platforms/pseries/setup.c, within the pseries_kexec_cpu_down() function in arch/powerpc/platforms/pseries/kexec.c, within the default_machine_kexec() function in arch/powerpc/kexec/core_64.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95503
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42232
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the delayed_work() and EXPORT_SYMBOL() functions in net/ceph/mon_client.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95502
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42236
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the usb_string_copy() function in drivers/usb/gadget/configfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95513
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42237
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the cs_dsp_load(), cs_dsp_load_coeff() and regmap_async_complete() functions in drivers/firmware/cirrus/cs_dsp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95514
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42238
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the cs_dsp_load() and cs_dsp_load_coeff() functions in drivers/firmware/cirrus/cs_dsp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95507
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42239
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __bpf_async_init(), drop_prog_refcnt(), BPF_CALL_1() and hrtimer_cancel() functions in kernel/bpf/helpers.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95516
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42240
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the SYM_INNER_LABEL() function in arch/x86/entry/entry_64_compat.S. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95517
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42241
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the shmem_confirm_swap() and shmem_is_huge() functions in mm/shmem.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95510
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42244
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the mos7840_port_remove() function in drivers/usb/serial/mos7840.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95508
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42245
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the detach_tasks() function in kernel/sched/fair.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95515
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42246
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the xs_tcp_setup_socket() function in net/sunrpc/xprtsock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95518
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42247
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the swap_endian() function in drivers/net/wireguard/allowedips.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95509
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42250
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the cachefiles_daemon_poll() function in fs/cachefiles/daemon.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95562
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42253
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the pca953x_irq_bus_sync_unlock() function in drivers/gpio/gpio-pca953x.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96008
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42259
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the i915_error_to_vmf_fault() and vm_fault_gtt() functions in drivers/gpu/drm/i915/gem/i915_gem_mman.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96159
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42268
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the mlx5_fw_reset_set_live_patch() and mlx5_fw_reset_complete_reload() functions in drivers/net/ethernet/mellanox/mlx5/core/fw_reset.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96146
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42269
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ip6table_nat_init() function in net/ipv6/netfilter/ip6table_nat.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96145
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42270
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the iptable_nat_init() function in net/ipv4/netfilter/iptable_nat.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96105
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42271
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the iucv_sever_path() function in net/iucv/af_iucv.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96158
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42274
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the update_pcm_pointers() and amdtp_domain_stream_pcm_pointer() functions in sound/firewire/amdtp-stream.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96205
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42276
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the nvme_prep_rq() function in drivers/nvme/host/pci.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96144
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42277
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the sprd_iommu_cleanup() function in drivers/iommu/sprd-iommu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96143
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42278
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the tasdev_load_calibrated_data() function in sound/soc/codecs/tas2781-fmwlib.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96167
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42279
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the REG_CONTROL2() and mchp_corespi_transfer_one() functions in drivers/spi/spi-microchip-core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96106
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42280
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the hfcmulti_dtmf() and HFC_wait_nodebug() functions in drivers/isdn/hardware/mISDN/hfcmulti.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96206
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42281
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the bpf_skb_net_grow() function in net/core/filter.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96195
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42283
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the nla_put_nh_group() function in net/ipv4/nexthop.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96176
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42284
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the tipc_udp_addr2str() function in net/tipc/udp_media.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96107
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42285
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the EXPORT_SYMBOL(), destroy_cm_id() and cm_work_handler() functions in drivers/infiniband/core/iwcm.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96141
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42286
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the qla_nvme_register_remote() function in drivers/scsi/qla2xxx/qla_nvme.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96140
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42287
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __qla2x00_abort_all_cmds() function in drivers/scsi/qla2xxx/qla_os.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96177
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42288
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the qla2x00_number_of_exch() function in drivers/scsi/qla2xxx/qla_os.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96139
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42289
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the qla24xx_disable_vp() function in drivers/scsi/qla2xxx/qla_mid.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96181
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42290
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the imx_irqsteer_get_reg_index(), imx_irqsteer_irq_mask() and imx_irqsteer_probe() functions in drivers/irqchip/irq-imx-irqsteer.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96207
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42291
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ice_vc_fdir_reset_cnt_all(), ice_vc_add_fdir_fltr_post(), ice_vc_del_fdir_fltr_post() and ice_vc_add_fdir_fltr() functions in drivers/net/ethernet/intel/ice/ice_virtchnl_fdir.c, within the ice_parse_rx_flow_user_data() function in drivers/net/ethernet/intel/ice/ice_ethtool_fdir.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96114
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42292
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the zap_modalias_env() function in lib/kobject_uevent.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96166
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42295
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the nilfs_btree_get_new_block() function in fs/nilfs2/btree.c, within the nilfs_btnode_create_block() function in fs/nilfs2/btnode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96138
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42298
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the qmc_audio_dai_parse() function in sound/soc/fsl/fsl_qmc_audio.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96116
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42301
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the do_active_device(), do_autoprobe(), do_hardware_base_addr(), do_hardware_irq(), do_hardware_dma() and do_hardware_modes() functions in drivers/parport/procfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96108
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42302
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the pci_bus_max_d3cold_delay() and pci_bridge_wait_for_secondary_bus() functions in drivers/pci/pci.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96208
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42303
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the pxp_probe() function in drivers/media/platform/nxp/imx-pxp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96136
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42308
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dc_plane_get_status() function in drivers/gpu/drm/amd/display/dc/core/dc_surface.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96135
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42309
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the psb_intel_lvds_get_modes() function in drivers/gpu/drm/gma500/psb_intel_lvds.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96134
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42310
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cdv_intel_lvds_get_modes() function in drivers/gpu/drm/gma500/cdv_intel_lvds.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96172
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42311
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the hfs_new_inode() and hfs_inode_read_fork() functions in fs/hfs/inode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96209
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42312
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the proc_sys_make_inode() function in fs/proc/proc_sysctl.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96109
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42313
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the vdec_close() function in drivers/media/platform/qcom/venus/vdec.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96110
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42314
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the add_ra_bio_pages() function in fs/btrfs/compression.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96152
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42315
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the exfat_get_dentry_set() function in fs/exfat/dir.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96174
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42316
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the folio_rotate_reclaimable() function in mm/vmscan.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96210
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42318
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the hook_cred_prepare() and hook_cred_free() functions in security/landlock/cred.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96190
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42319
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the cmdq_probe() function in drivers/mailbox/mtk-cmdq-mailbox.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96133
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42320
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dasd_copy_pair_store() function in drivers/s390/block/dasd_devmap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96189
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42322
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ip_vs_add_service() function in net/netfilter/ipvs/ip_vs_ctl.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96117
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43816
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the lpfc_prep_embed_io() function in drivers/scsi/lpfc/lpfc_sli.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96160
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43817
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the include/linux/virtio_net.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96131
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43818
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the st_es8336_late_probe() function in sound/soc/amd/acp-es8336.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96130
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43819
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the kvm_arch_prepare_memory_region() function in arch/s390/kvm/kvm-s390.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96129
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43821
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the lpfc_xcvr_data_show() function in drivers/scsi/lpfc/lpfc_attr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96127
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43823
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ks_pcie_setup_rc_app_regs() and ks_pcie_host_init() functions in drivers/pci/controller/dwc/pci-keystone.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96126
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43824
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the pci_epf_test_core_init() function in drivers/pci/endpoint/functions/pci-epf-test.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96111
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43825
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the iio_gts_build_avail_time_table() function in drivers/iio/industrialio-gts-helper.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96150
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43826
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nfs_wb_folio_cancel() and nfs_wb_folio() functions in fs/nfs/write.c, within the nfs_read_folio() function in fs/nfs/read.c, within the nfs_invalidate_folio() and nfs_launder_folio() functions in fs/nfs/file.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96124
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43829
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the qxl_add_mode() function in drivers/gpu/drm/qxl/qxl_display.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96162
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43830
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the led_trigger_set() function in drivers/leds/led-triggers.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96196
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43831
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the vpu_dec_init() function in drivers/media/platform/mediatek/vcodec/decoder/vdec_vpu_if.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96123
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43833
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the v4l2_async_create_ancillary_links() function in drivers/media/v4l2-core/v4l2-async.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96103
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43834
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the xdp_unreg_mem_model() function in net/core/xdp.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96121
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43837
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the include/linux/bpf_verifier.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96197
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43839
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the bnad_tx_msix_register() and bnad_rx_msix_register() functions in drivers/net/ethernet/brocade/bna/bnad.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96178
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43840
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the prepare_trampoline() function in arch/arm64/net/bpf_jit_comp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96187
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43841
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the virt_wifi_inform_bss(), virt_wifi_connect() and virt_wifi_connect_complete() functions in drivers/net/wireless/virt_wifi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96198
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43842
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the rtw89_sta_info_get_iter() function in drivers/net/wireless/realtek/rtw89/debug.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96186
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43846
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the objagg_obj_parent_assign() function in lib/objagg.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96199
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43847
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the drivers/net/wireless/ath/ath12k/hw.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96200
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43849
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the pdr_locator_new_server(), pdr_locator_del_server() and pdr_get_domain_list() functions in drivers/soc/qcom/pdr_interface.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96185
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43850
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the bwmon_start() and bwmon_probe() functions in drivers/soc/qcom/icc-bwmon.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96179
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43851
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the DEFINE_PER_CPU_READ_MOSTLY(), xlnx_disable_percpu_irq() and xlnx_event_init_sgi() functions in drivers/soc/xilinx/xlnx_event_manager.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96104
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43853
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the proc_cpuset_show() function in kernel/cgroup/cpuset.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96099
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43854
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the bio_integrity_prep() function in block/bio-integrity.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96147
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43855
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the md_end_flush(), submit_flushes() and md_submit_flush_data() functions in drivers/md/md.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96191
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43856
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the dmam_free_coherent() function in kernel/dma/mapping.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96113
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43858
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the diSync() and diRead() functions in fs/jfs/jfs_imap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96118
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43860
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the imx_rproc_addr_init() function in drivers/remoteproc/imx_rproc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96290
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43861
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the qmimux_rx_fixup() function in drivers/net/usb/qmi_wwan.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96297
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43863
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the vmw_fence_obj_destroy(), vmw_fence_obj_init() and vmw_fence_goal_new_locked() functions in drivers/gpu/drm/vmwgfx/vmwgfx_fence.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96289
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43864
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the mlx5_tc_ct_entry_destroy_mod_hdr() function in drivers/net/ethernet/mellanox/mlx5/core/en/tc_ct.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96293
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43866
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mlx5_sf_dev_shutdown() function in drivers/net/ethernet/mellanox/mlx5/core/sf/dev/driver.c, within the mlx5_try_fast_unload() and shutdown() functions in drivers/net/ethernet/mellanox/mlx5/core/main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96301
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43867
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the nouveau_gem_prime_import_sg_table() function in drivers/gpu/drm/nouveau/nouveau_prime.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96287
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43871
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the EXPORT_SYMBOL_GPL() function in drivers/base/devres.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96294
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43872
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the next_ceqe_sw_v2(), hns_roce_v2_msix_interrupt_eq(), hns_roce_ceq_work(), __hns_roce_request_irq() and __hns_roce_free_irq() functions in drivers/infiniband/hw/hns/hns_roce_hw_v2.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96300
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43873
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the vhost_vsock_dev_open() and vhost_vsock_set_features() functions in drivers/vhost/vsock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96291
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43874
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __sev_snp_shutdown_locked() function in drivers/crypto/ccp/sev-dev.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96298
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43875
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the vpci_scan_bus() and epf_ntb_bind() functions in drivers/pci/endpoint/functions/pci-epf-vntb.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96303
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43876
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the rcar_pcie_wakeup() function in drivers/pci/controller/pcie-rcar-host.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96302
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43877
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the ivtvfb_prep_dec_dma_to_device() function in drivers/media/pci/ivtv/ivtvfb.c, within the ivtv_yuv_prep_user_dma() function in drivers/media/pci/ivtv/ivtv-yuv.c, within the ivtv_udma_setup() function in drivers/media/pci/ivtv/ivtv-udma.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96304
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43879
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the cfg80211_calculate_bitrate_he() function in net/wireless/util.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96305
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43880
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the objagg_hints_obj_cmp() and objagg_hints_get() functions in lib/objagg.c, within the mlxsw_sp_acl_erp_delta_check() and mlxsw_sp_acl_erp_root_destroy() functions in drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_erp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96288
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43881
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ath12k_dp_rx_h_defrag_reo_reinject() and spin_unlock_bh() functions in drivers/net/wireless/ath/ath12k/dp_rx.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96295
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43882
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the bprm_fill_uid() function in fs/exec.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96493
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43883
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the vhci_urb_enqueue(), vhci_shutdown_connection() and vhci_device_reset() functions in drivers/usb/usbip/vhci_hcd.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96538
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43884
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the pair_device() function in net/bluetooth/mgmt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96539
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43885
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the btrfs_release_log_ctx_extents() function in fs/btrfs/file.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96545
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43889
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the padata_do_multithreaded() function in kernel/padata.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96546
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43892
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the MEM_CGROUP_ID_MAX(), mem_cgroup_alloc() and mem_cgroup_css_online() functions in mm/memcontrol.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96540
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43893
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the uart_set_info() function in drivers/tty/serial/serial_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96536
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43894
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the drm_client_modeset_probe() function in drivers/gpu/drm/drm_client_modeset.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96535
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43895
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the is_dsc_need_re_compute() function in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_mst_types.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96541
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43897
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the __udp_gso_segment() function in net/ipv4/udp_offload.c, within the tcp_gso_segment() function in net/ipv4/tcp_offload.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96532
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43899
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn20_get_dcc_compression_cap() function in drivers/gpu/drm/amd/display/dc/resource/dcn20/dcn20_resource.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96515
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43900
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the load_firmware_cb() function in drivers/media/tuners/xc2028.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96530
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43902
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dm_suspend(), create_eml_sink() and amdgpu_dm_connector_get_modes() functions in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96520
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43903
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the handle_cursor_update() function in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_plane.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96528
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43905
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the vega10_find_dpm_states_clocks_in_dpm_table(), vega10_generate_dpm_level_enable_mask(), vega10_check_states_equal(), vega10_set_sclk_od(), vega10_set_mclk_od(), vega10_odn_update_power_state() and vega10_get_performance_level() functions in drivers/gpu/drm/amd/pm/powerplay/hwmgr/vega10_hwmgr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96527
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43906
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ta_if_invoke_debugfs_write() function in drivers/gpu/drm/amd/amdgpu/amdgpu_psp_ta.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96526
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43907
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the vega10_apply_state_adjust_rules() function in drivers/gpu/drm/amd/pm/powerplay/hwmgr/vega10_hwmgr.c, within the smu8_apply_state_adjust_rules() function in drivers/gpu/drm/amd/pm/powerplay/hwmgr/smu8_hwmgr.c, within the smu7_apply_state_adjust_rules() function in drivers/gpu/drm/amd/pm/powerplay/hwmgr/smu7_hwmgr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96525
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43908
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the amdgpu_ras_interrupt_process_handler() function in drivers/gpu/drm/amd/amdgpu/amdgpu_ras.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96524
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43909
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the smu7_update_edc_leakage_table() and smu7_hwmgr_backend_init() functions in drivers/gpu/drm/amd/pm/powerplay/hwmgr/smu7_hwmgr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96523
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43911
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ieee80211_start_tx_ba_session() function in net/mac80211/agg-tx.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96548
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43912
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the __nl80211_set_channel() function in net/wireless/nl80211.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96512
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44931
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the gpiochip_get_desc() function in drivers/gpio/gpiolib.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96550
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44938
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the dbDiscardAG() function in fs/jfs/jfs_dmap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96551
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44939
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dtInsert() function in fs/jfs/jfs_dtree.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_8-rt: before 1-150600.1.3.2
kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo: before 1-150600.1.3.2
kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource: before 1-150600.1.3.2
kernel-rt_debug: before 6.4.0-150600.10.8.3
kernel-rt: before 6.4.0-150600.10.8.3
kernel-source-rt: before 6.4.0-150600.10.8.3
kernel-devel-rt: before 6.4.0-150600.10.8.3
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel: before 6.4.0-150600.10.8.3
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.8.3
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.8.3
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso: before 6.4.0-150600.10.8.3
kernel-syms-rt: before 6.4.0-150600.10.8.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-optional: before 6.4.0-150600.10.8.3
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt: before 6.4.0-150600.10.8.3
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-debugsource: before 6.4.0-150600.10.8.3
dlm-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.8.3
kernel-rt_debug-debugsource: before 6.4.0-150600.10.8.3
gfs2-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-extra: before 6.4.0-150600.10.8.3
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.8.3
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.8.3
kselftests-kmp-rt: before 6.4.0-150600.10.8.3
kernel-rt-devel: before 6.4.0-150600.10.8.3
kernel-rt-livepatch-devel: before 6.4.0-150600.10.8.3
kernel-rt_debug-vdso: before 6.4.0-150600.10.8.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.