Risk | High |
Patch available | YES |
Number of vulnerabilities | 439 |
CVE-ID | CVE-2021-47416 CVE-2021-47534 CVE-2021-47594 CVE-2022-3435 CVE-2022-45934 CVE-2022-48664 CVE-2022-48674 CVE-2022-48879 CVE-2022-48946 CVE-2022-48947 CVE-2022-48948 CVE-2022-48949 CVE-2022-48951 CVE-2022-48953 CVE-2022-48954 CVE-2022-48955 CVE-2022-48956 CVE-2022-48957 CVE-2022-48958 CVE-2022-48959 CVE-2022-48960 CVE-2022-48961 CVE-2022-48962 CVE-2022-48966 CVE-2022-48967 CVE-2022-48968 CVE-2022-48969 CVE-2022-48970 CVE-2022-48971 CVE-2022-48972 CVE-2022-48973 CVE-2022-48975 CVE-2022-48977 CVE-2022-48978 CVE-2022-48979 CVE-2022-48980 CVE-2022-48981 CVE-2022-48982 CVE-2022-48983 CVE-2022-48985 CVE-2022-48987 CVE-2022-48988 CVE-2022-48989 CVE-2022-48990 CVE-2022-48991 CVE-2022-48992 CVE-2022-48994 CVE-2022-48995 CVE-2022-48997 CVE-2022-48999 CVE-2022-49000 CVE-2022-49002 CVE-2022-49003 CVE-2022-49005 CVE-2022-49006 CVE-2022-49007 CVE-2022-49010 CVE-2022-49011 CVE-2022-49012 CVE-2022-49014 CVE-2022-49015 CVE-2022-49016 CVE-2022-49017 CVE-2022-49019 CVE-2022-49020 CVE-2022-49021 CVE-2022-49022 CVE-2022-49023 CVE-2022-49024 CVE-2022-49025 CVE-2022-49026 CVE-2022-49027 CVE-2022-49028 CVE-2022-49029 CVE-2022-49031 CVE-2022-49032 CVE-2023-2166 CVE-2023-28327 CVE-2023-52766 CVE-2023-52800 CVE-2023-52881 CVE-2023-52915 CVE-2023-52917 CVE-2023-52918 CVE-2023-52919 CVE-2023-52921 CVE-2023-52922 CVE-2023-6270 CVE-2024-26782 CVE-2024-26906 CVE-2024-26953 CVE-2024-27043 CVE-2024-35888 CVE-2024-35937 CVE-2024-35980 CVE-2024-36244 CVE-2024-36484 CVE-2024-36883 CVE-2024-36886 CVE-2024-36905 CVE-2024-36953 CVE-2024-36954 CVE-2024-36957 CVE-2024-38577 CVE-2024-38589 CVE-2024-38615 CVE-2024-39476 CVE-2024-40965 CVE-2024-40997 CVE-2024-41016 CVE-2024-41023 CVE-2024-41049 CVE-2024-42131 CVE-2024-42145 CVE-2024-42226 CVE-2024-42253 CVE-2024-43817 CVE-2024-43897 CVE-2024-44931 CVE-2024-44932 CVE-2024-44947 CVE-2024-44958 CVE-2024-44964 CVE-2024-44995 CVE-2024-45016 CVE-2024-45025 CVE-2024-46678 CVE-2024-46681 CVE-2024-46716 CVE-2024-46719 CVE-2024-46754 CVE-2024-46770 CVE-2024-46775 CVE-2024-46777 CVE-2024-46800 CVE-2024-46802 CVE-2024-46804 CVE-2024-46805 CVE-2024-46807 CVE-2024-46809 CVE-2024-46810 CVE-2024-46811 CVE-2024-46812 CVE-2024-46813 CVE-2024-46814 CVE-2024-46815 CVE-2024-46816 CVE-2024-46817 CVE-2024-46818 CVE-2024-46819 CVE-2024-46821 CVE-2024-46826 CVE-2024-46828 CVE-2024-46834 CVE-2024-46835 CVE-2024-46840 CVE-2024-46841 CVE-2024-46842 CVE-2024-46848 CVE-2024-46849 CVE-2024-46853 CVE-2024-46854 CVE-2024-46855 CVE-2024-46857 CVE-2024-46859 CVE-2024-46864 CVE-2024-46871 CVE-2024-47660 CVE-2024-47661 CVE-2024-47663 CVE-2024-47664 CVE-2024-47665 CVE-2024-47667 CVE-2024-47668 CVE-2024-47669 CVE-2024-47670 CVE-2024-47671 CVE-2024-47672 CVE-2024-47673 CVE-2024-47674 CVE-2024-47679 CVE-2024-47682 CVE-2024-47684 CVE-2024-47685 CVE-2024-47692 CVE-2024-47693 CVE-2024-47695 CVE-2024-47696 CVE-2024-47697 CVE-2024-47698 CVE-2024-47699 CVE-2024-47701 CVE-2024-47704 CVE-2024-47705 CVE-2024-47706 CVE-2024-47707 CVE-2024-47709 CVE-2024-47710 CVE-2024-47712 CVE-2024-47713 CVE-2024-47718 CVE-2024-47720 CVE-2024-47723 CVE-2024-47727 CVE-2024-47728 CVE-2024-47730 CVE-2024-47735 CVE-2024-47737 CVE-2024-47738 CVE-2024-47739 CVE-2024-47742 CVE-2024-47745 CVE-2024-47747 CVE-2024-47748 CVE-2024-47749 CVE-2024-47756 CVE-2024-47757 CVE-2024-49850 CVE-2024-49851 CVE-2024-49852 CVE-2024-49855 CVE-2024-49858 CVE-2024-49860 CVE-2024-49861 CVE-2024-49863 CVE-2024-49866 CVE-2024-49867 CVE-2024-49868 CVE-2024-49870 CVE-2024-49871 CVE-2024-49875 CVE-2024-49877 CVE-2024-49879 CVE-2024-49881 CVE-2024-49882 CVE-2024-49883 CVE-2024-49884 CVE-2024-49886 CVE-2024-49890 CVE-2024-49891 CVE-2024-49892 CVE-2024-49894 CVE-2024-49895 CVE-2024-49896 CVE-2024-49897 CVE-2024-49899 CVE-2024-49900 CVE-2024-49901 CVE-2024-49902 CVE-2024-49903 CVE-2024-49905 CVE-2024-49906 CVE-2024-49907 CVE-2024-49908 CVE-2024-49909 CVE-2024-49911 CVE-2024-49912 CVE-2024-49913 CVE-2024-49914 CVE-2024-49917 CVE-2024-49918 CVE-2024-49919 CVE-2024-49920 CVE-2024-49921 CVE-2024-49922 CVE-2024-49923 CVE-2024-49924 CVE-2024-49925 CVE-2024-49929 CVE-2024-49930 CVE-2024-49933 CVE-2024-49934 CVE-2024-49935 CVE-2024-49936 CVE-2024-49938 CVE-2024-49939 CVE-2024-49945 CVE-2024-49946 CVE-2024-49947 CVE-2024-49949 CVE-2024-49950 CVE-2024-49954 CVE-2024-49955 CVE-2024-49957 CVE-2024-49958 CVE-2024-49959 CVE-2024-49960 CVE-2024-49962 CVE-2024-49963 CVE-2024-49965 CVE-2024-49966 CVE-2024-49967 CVE-2024-49968 CVE-2024-49969 CVE-2024-49973 CVE-2024-49974 CVE-2024-49975 CVE-2024-49981 CVE-2024-49982 CVE-2024-49983 CVE-2024-49985 CVE-2024-49989 CVE-2024-49991 CVE-2024-49993 CVE-2024-49995 CVE-2024-49996 CVE-2024-50000 CVE-2024-50001 CVE-2024-50002 CVE-2024-50003 CVE-2024-50006 CVE-2024-50007 CVE-2024-50008 CVE-2024-50009 CVE-2024-50013 CVE-2024-50014 CVE-2024-50017 CVE-2024-50019 CVE-2024-50024 CVE-2024-50025 CVE-2024-50026 CVE-2024-50028 CVE-2024-50031 CVE-2024-50033 CVE-2024-50035 CVE-2024-50041 CVE-2024-50044 CVE-2024-50045 CVE-2024-50046 CVE-2024-50047 CVE-2024-50048 CVE-2024-50049 CVE-2024-50055 CVE-2024-50058 CVE-2024-50059 CVE-2024-50061 CVE-2024-50062 CVE-2024-50063 CVE-2024-50067 CVE-2024-50073 CVE-2024-50074 CVE-2024-50077 CVE-2024-50078 CVE-2024-50081 CVE-2024-50082 CVE-2024-50089 CVE-2024-50093 CVE-2024-50095 CVE-2024-50096 CVE-2024-50098 CVE-2024-50099 CVE-2024-50103 CVE-2024-50108 CVE-2024-50110 CVE-2024-50115 CVE-2024-50116 CVE-2024-50117 CVE-2024-50124 CVE-2024-50125 CVE-2024-50127 CVE-2024-50128 CVE-2024-50131 CVE-2024-50134 CVE-2024-50135 CVE-2024-50138 CVE-2024-50141 CVE-2024-50146 CVE-2024-50147 CVE-2024-50148 CVE-2024-50150 CVE-2024-50153 CVE-2024-50154 CVE-2024-50155 CVE-2024-50156 CVE-2024-50160 CVE-2024-50167 CVE-2024-50171 CVE-2024-50179 CVE-2024-50180 CVE-2024-50182 CVE-2024-50183 CVE-2024-50184 CVE-2024-50186 CVE-2024-50187 CVE-2024-50188 CVE-2024-50189 CVE-2024-50192 CVE-2024-50194 CVE-2024-50195 CVE-2024-50196 CVE-2024-50198 CVE-2024-50201 CVE-2024-50205 CVE-2024-50208 CVE-2024-50209 CVE-2024-50215 CVE-2024-50218 CVE-2024-50229 CVE-2024-50230 CVE-2024-50232 CVE-2024-50233 CVE-2024-50234 CVE-2024-50236 CVE-2024-50237 CVE-2024-50249 CVE-2024-50255 CVE-2024-50259 CVE-2024-50261 CVE-2024-50264 CVE-2024-50265 CVE-2024-50267 CVE-2024-50268 CVE-2024-50269 CVE-2024-50271 CVE-2024-50273 CVE-2024-50274 CVE-2024-50279 CVE-2024-50282 CVE-2024-50287 CVE-2024-50289 CVE-2024-50290 CVE-2024-50292 CVE-2024-50295 CVE-2024-50298 CVE-2024-50301 CVE-2024-50302 CVE-2024-53052 CVE-2024-53058 CVE-2024-53059 CVE-2024-53060 CVE-2024-53061 CVE-2024-53063 CVE-2024-53066 CVE-2024-53068 CVE-2024-53079 CVE-2024-53085 CVE-2024-53088 CVE-2024-53104 CVE-2024-53110 |
CWE-ID | CWE-401 CWE-476 CWE-125 CWE-190 CWE-667 CWE-416 CWE-119 CWE-787 CWE-399 CWE-415 CWE-200 CWE-20 CWE-388 CWE-191 CWE-835 CWE-682 CWE-451 CWE-908 CWE-617 CWE-362 CWE-193 CWE-665 CWE-369 CWE-404 |
Exploitation vector | Network |
Public exploit |
Public exploit code for vulnerability #121 is available. Vulnerability #426 is being exploited in the wild. Vulnerability #438 is being exploited in the wild. |
Vulnerable software |
SUSE Linux Enterprise Micro Operating systems & Components / Operating system SUSE Linux Enterprise Live Patching Operating systems & Components / Operating system SUSE Linux Enterprise High Availability Extension 15 Operating systems & Components / Operating system Development Tools Module Operating systems & Components / Operating system Legacy Module Operating systems & Components / Operating system Basesystem Module Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system SUSE Linux Enterprise Real Time 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 15 Operating systems & Components / Operating system SUSE Linux Enterprise Desktop 15 Operating systems & Components / Operating system gfs2-kmp-default-debuginfo Operating systems & Components / Operating system package or component dlm-kmp-default-debuginfo Operating systems & Components / Operating system package or component gfs2-kmp-default Operating systems & Components / Operating system package or component cluster-md-kmp-default Operating systems & Components / Operating system package or component dlm-kmp-default Operating systems & Components / Operating system package or component ocfs2-kmp-default-debuginfo Operating systems & Components / Operating system package or component ocfs2-kmp-default Operating systems & Components / Operating system package or component cluster-md-kmp-default-debuginfo Operating systems & Components / Operating system package or component kernel-livepatch-SLE15-SP5_Update_21-debugsource Operating systems & Components / Operating system package or component kernel-default-livepatch-devel Operating systems & Components / Operating system package or component kernel-livepatch-5_14_21-150500_55_88-default Operating systems & Components / Operating system package or component kernel-default-livepatch Operating systems & Components / Operating system package or component kernel-livepatch-5_14_21-150500_55_88-default-debuginfo Operating systems & Components / Operating system package or component reiserfs-kmp-default Operating systems & Components / Operating system package or component reiserfs-kmp-default-debuginfo Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-obs-build-debugsource Operating systems & Components / Operating system package or component kernel-obs-build Operating systems & Components / Operating system package or component kernel-syms Operating systems & Components / Operating system package or component kernel-docs Operating systems & Components / Operating system package or component kernel-zfcpdump-debuginfo Operating systems & Components / Operating system package or component kernel-zfcpdump-debugsource Operating systems & Components / Operating system package or component kernel-zfcpdump Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-macros Operating systems & Components / Operating system package or component kernel-default-devel-debuginfo Operating systems & Components / Operating system package or component kernel-default-devel Operating systems & Components / Operating system package or component kernel-64kb-debugsource Operating systems & Components / Operating system package or component kernel-64kb-devel Operating systems & Components / Operating system package or component kernel-64kb-debuginfo Operating systems & Components / Operating system package or component kernel-64kb-devel-debuginfo Operating systems & Components / Operating system package or component kernel-64kb Operating systems & Components / Operating system package or component kernel-default-debugsource Operating systems & Components / Operating system package or component kernel-default-debuginfo Operating systems & Components / Operating system package or component kernel-default-base Operating systems & Components / Operating system package or component kernel-default Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 439 vulnerabilities.
EUVDB-ID: #VU89967
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47416
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the __mdiobus_register() function in drivers/net/phy/mdio_bus.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91617
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47534
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the vc4_atomic_commit_tail() function in drivers/gpu/drm/vc4/vc4_kms.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92336
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47594
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mptcp_pm_nl_rm_addr_or_subflow() function in net/mptcp/pm_netlink.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU70499
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-3435
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the fib_nh_match() function in net/ipv4/fib_semantics.c IPv4 handler. A remote attacker can send specially crafted data to the system, trigger an out-of-bounds read error and read contents of memory on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU70464
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-45934
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow within the l2cap_config_req() function in net/bluetooth/l2cap_core.c in Linux kernel. A local user can pass specially crafted L2CAP_CONF_REQ packets to the device, trigger an integer overflow and execute arbitrary code with elevated privileges.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92031
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48664
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the close_ctree() function in fs/btrfs/disk-io.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90174
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48674
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a use-after-free error within the fs/erofs/internal.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96355
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48879
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the efisubsys_init() and generic_ops_unregister() functions in drivers/firmware/efi/efi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99094
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48946
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the udf_truncate_tail_extent() function in fs/udf/truncate.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99095
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48947
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the l2cap_config_req() function in net/bluetooth/l2cap_core.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99096
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48948
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the uvc_function_ep0_complete() function in drivers/usb/gadget/function/f_uvc.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99153
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48949
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the igb_vf_reset_msg() function in drivers/net/ethernet/intel/igb/igb_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99179
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48951
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to an out-of-bounds write within the snd_soc_put_volsw_sx() function in sound/soc/soc-ops.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99139
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48953
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the cmos_check_acpi_rtc_status(), cmos_pnp_probe(), cmos_of_init() and cmos_platform_probe() functions in drivers/rtc/rtc-cmos.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99050
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48954
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the qeth_l2_br2dev_worker() and dev_put() functions in drivers/s390/net/qeth_l2_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99103
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48955
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information disclosure within the tbnet_open() function in drivers/net/thunderbolt.c. A local user can gain access to sensitive information.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99165
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48956
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ip6_fragment() function in net/ipv6/ip6_output.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99104
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48957
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information disclosure within the dpaa2_switch_acl_entry_add() and dpaa2_switch_acl_entry_remove() functions in drivers/net/ethernet/freescale/dpaa2/dpaa2-switch-flower.c. A local user can gain access to sensitive information.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99105
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48958
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information disclosure within the greth_init_rings() function in drivers/net/ethernet/aeroflex/greth.c. A local user can gain access to sensitive information.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99106
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48959
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information disclosure within the sja1105_setup_devlink_regions() function in drivers/net/dsa/sja1105/sja1105_devlink.c. A local user can gain access to sensitive information.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99207
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48960
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the hix5hd2_rx() function in drivers/net/ethernet/hisilicon/hix5hd2_gmac.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99164
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48961
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the mdio_device_free() and EXPORT_SYMBOL() functions in drivers/net/phy/mdio_device.c, within the of_mdiobus_register_device() function in drivers/net/mdio/of_mdio.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99208
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48962
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the hisi_femac_rx() function in drivers/net/ethernet/hisilicon/hisi_femac.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99210
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48966
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the mvneta_config_rss() function in drivers/net/ethernet/marvell/mvneta.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99211
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48967
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the nci_add_new_protocol() function in net/nfc/nci/ntf.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99109
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48968
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information disclosure within the otx2_init_tc() function in drivers/net/ethernet/marvell/octeontx2/nic/otx2_tc.c. A local user can gain access to sensitive information.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99131
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48969
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the netfront_resume() function in drivers/net/xen-netfront.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99140
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48970
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the sk_diag_show_rqlen(), sk_diag_fill(), sk_diag_dump() and unix_diag_dump() functions in net/unix/diag.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99141
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48971
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the bt_init() and sock_unregister() functions in net/bluetooth/af_bluetooth.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99163
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48972
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ieee802154_if_add() function in net/mac802154/iface.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99065
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48973
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the ioport_unmap() and amd_gpio_exit() functions in drivers/gpio/gpio-amd8111.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99110
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48975
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information disclosure within the gpiochip_setup_dev(), gpiochip_add_data_with_key(), gpiochip_remove_pin_ranges() and ida_free() functions in drivers/gpio/gpiolib.c. A local user can gain access to sensitive information.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99217
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48977
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the can_rcv() and canfd_rcv() functions in net/can/af_can.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99142
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48978
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the snto32() function in drivers/hid/hid-core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99216
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48979
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the drivers/gpu/drm/amd/display/dc/dml/display_mode_vba.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99002
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48980
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the sja1105_init_l2_policing() function in drivers/net/dsa/sja1105/sja1105_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99051
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48981
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the drm_gem_shmem_mmap() function in drivers/gpu/drm/drm_gem_shmem_helper.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98992
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48982
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the hci_register_dev() function in net/bluetooth/hci_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99003
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48983
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the io_tctx_exit_cb() function in io_uring/io_uring.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99097
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48985
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the mana_poll_rx_cq() and mana_cq_handler() functions in drivers/net/ethernet/microsoft/mana/mana_en.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99035
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48987
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the v4l2_valid_dv_timings() function in drivers/media/v4l2-core/v4l2-dv-timings.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99197
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48988
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the memcg_write_event_control() function in mm/memcontrol.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99138
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48989
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the set_bit() function in fs/fscache/cookie.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99093
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48990
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the amdgpu_job_free_cb() function in drivers/gpu/drm/amd/amdgpu/amdgpu_job.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99215
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48991
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the retract_page_tables() function in mm/khugepaged.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99214
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48992
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the dpcm_be_reparent() function in sound/soc/soc-pcm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99195
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48994
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the EXPORT_SYMBOL() and snd_seq_expand_var_event() functions in sound/core/seq/seq_memory.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99052
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48995
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the raydium_i2c_send() function in drivers/input/touchscreen/raydium_i2c_ts.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99004
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48997
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the tpm_pm_suspend() function in drivers/char/tpm/tpm-interface.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99206
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48999
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ipv4_fcnal() function in tools/testing/selftests/net/fib_nexthops.sh, within the fib_nh_match() function in net/ipv4/fib_semantics.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99060
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49000
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the has_external_pci() function in drivers/iommu/intel/iommu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99066
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49002
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the dmar_dev_scope_init() function in drivers/iommu/dmar.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99005
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49003
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nvme_mpath_revalidate_paths() function in drivers/nvme/host/multipath.c, within the nvme_ns_remove() function in drivers/nvme/host/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99213
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49005
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the snd_soc_put_volsw_sx() function in sound/soc/soc-ops.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99119
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49006
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the probe_remove_event_call() function in kernel/trace/trace_events.c, within the dyn_event_release() and dyn_events_release_all() functions in kernel/trace/trace_dynevent.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99036
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49007
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the nilfs_dat_commit_free() function in fs/nilfs2/dat.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99037
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49010
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the coretemp_remove_core() function in drivers/hwmon/coretemp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99113
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49011
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information disclosure within the adjust_tjmax() function in drivers/hwmon/coretemp.c. A local user can gain access to sensitive information.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99114
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49012
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information disclosure within the afs_put_server() function in fs/afs/server.c. A local user can gain access to sensitive information.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99182
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49014
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the __tun_detach() and tun_detach() functions in drivers/net/tun.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99199
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49015
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the hsr_deliver_master() function in net/hsr/hsr_forward.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99162
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49016
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the phy_mdio_device_free() function in drivers/net/phy/phy_device.c, within the fwnode_mdiobus_register_phy() function in drivers/net/mdio/fwnode_mdio.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99053
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49017
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the tipc_crypto_key_synch() function in net/tipc/crypto.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99120
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49019
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the nixge_hw_dma_bd_release() function in drivers/net/ethernet/ni/nixge.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99116
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49020
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information disclosure within the p9_socket_open() function in net/9p/trans_fd.c. A local user can gain access to sensitive information.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99136
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49021
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the module_put() function in drivers/net/phy/phy_device.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99200
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49022
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ieee80211_get_rate_duration() function in net/mac80211/airtime.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99098
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49023
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the cfg80211_gen_new_ie() function in net/wireless/scan.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99068
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49024
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the m_can_pci_probe() and m_can_pci_remove() functions in drivers/net/can/m_can/m_can_pci.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99201
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49025
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the drivers/net/ethernet/mellanox/mlx5/core/eswitch_offloads_termtbl.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99054
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49026
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the e100_xmit_prepare() function in drivers/net/ethernet/intel/e100.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99007
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49027
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the iavf_init_module() function in drivers/net/ethernet/intel/iavf/iavf_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99008
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49028
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ixgbevf_init_module() function in drivers/net/ethernet/intel/ixgbevf/ixgbevf_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99161
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49029
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ibmpex_register_bmc() function in drivers/hwmon/ibmpex.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99202
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49031
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the afe4403_read_raw() function in drivers/iio/health/afe4403.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99180
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49032
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to an out-of-bounds write within the afe4404_read_raw() and afe4404_write_raw() functions in drivers/iio/health/afe4404.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU79495
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-2166
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in net/can/af_can.c when processing CAN frames. A local user can pass specially crafted data to the system and perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU74772
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-28327
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the unix_diag_get_exact() function in net/unix/diag.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91086
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52766
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the hci_dma_irq_handler() function in drivers/i3c/master/mipi-i3c-hci/dma.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90071
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52800
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ath11k_htt_pktlog() function in drivers/net/wireless/ath/ath11k/dp_rx.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89895
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-52881
CWE-ID:
CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to an error within the tcp_ack() function in net/ipv4/tcp_input.c, which can result in system accepting ACK responses for bytes that were never sent. A remote attacker can perform spoofing attack.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96934
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52915
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the af9035_i2c_master_xfer() function in drivers/media/usb/dvb-usb-v2/af9035.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98973
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52917
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ndev_init_debugfs() function in drivers/ntb/hw/intel/ntb_hw_gen1.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99254
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52918
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cx23885_video_register() function in drivers/media/pci/cx23885/cx23885-video.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99255
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52919
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the send_acknowledge() function in net/nfc/nci/spi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100617
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52921
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the amdgpu_cs_pass1() function in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101033
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52922
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the bcm_release() function in net/can/bcm.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91599
Risk: Low
CVSSv4.0: 4.4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-6270
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the aoecmd_cfg_pkts() function in the ATA over Ethernet (AoE) driver. A local user can trigger a use-after-free error and escalate privileges on the system.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90927
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26782
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the mptcp_inet6_sk() and mptcp_sk_clone() functions in net/mptcp/protocol.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92944
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26906
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the copy_from_kernel_nofault_allowed() function in arch/x86/mm/maccess.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91359
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26953
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information disclosure within the esp_req_sg(), esp_ssg_unref(), esp_output_done() and esp6_output_tail() functions in net/ipv6/esp6.c, within the esp_req_sg(), esp_ssg_unref(), esp_output_done() and esp_output_tail() functions in net/ipv4/esp4.c. A local user can gain access to sensitive information.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90178
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27043
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the dvb_register_device() function in drivers/media/dvb-core/dvbdev.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90873
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35888
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the ip6erspan_rcv() function in net/ipv6/ip6_gre.c, within the erspan_rcv() function in net/ipv4/ip_gre.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91093
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35937
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ieee80211_amsdu_subframe_length(), ieee80211_is_valid_amsdu() and ieee80211_amsdu_to_8023s() functions in net/wireless/util.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91667
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35980
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the arch/arm64/include/asm/tlbflush.h. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93252
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36244
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the parse_taprio_schedule() function in net/sched/sch_taprio.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93039
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36484
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to reachable assertion within the __inet_accept() function in net/ipv4/af_inet.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90272
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36883
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the net_alloc_generic() and register_pernet_operations() functions in net/core/net_namespace.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90049
Risk: High
CVSSv4.0: 7.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-36886
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to a use-after-free error within the tipc_buf_append() function in net/tipc/msg.c when processing fragmented TIPC messages. A remote attacker can send specially crafted packets to the system, trigger a use-after-free error and execute arbitrary code on the system in the context of the kernel.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93375
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36905
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a race condition within the tcp_send_fin() function in net/ipv4/tcp_output.c, within the tcp_rcv_state_process() function in net/ipv4/tcp_input.c, within the tcp_shutdown() and __tcp_close() functions in net/ipv4/tcp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93450
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36953
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the kvm_register_vgic_device() function in arch/arm64/kvm/vgic/vgic-kvm-device.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90431
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36954
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the tipc_buf_append() function in net/tipc/msg.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91171
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36957
CWE-ID:
CWE-193 - Off-by-one Error
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an off-by-one error within the rvu_dbg_qsize_write() function in drivers/net/ethernet/marvell/octeontx2/af/rvu_debugfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92378
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38577
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the kernel/rcu/tasks.h. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92365
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38589
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nr_add_node() and nr_del_node() functions in net/netrom/nr_route.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94120
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38615
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the __cpufreq_offline() and cpufreq_remove_dev() functions in drivers/cpufreq/cpufreq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93824
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39476
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the raid5d() function in drivers/md/raid5.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94276
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40965
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the lpi2c_imx_config() and lpi2c_imx_probe() functions in drivers/i2c/busses/i2c-imx-lpi2c.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94210
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40997
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the amd_pstate_epp_cpu_exit() function in drivers/cpufreq/amd-pstate.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94837
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41016
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ocfs2_xattr_find_entry() function in fs/ocfs2/xattr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94924
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41023
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the enqueue_task_dl() function in kernel/sched/deadline.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94947
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41049
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the posix_lock_inode() function in fs/locks.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95035
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42131
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the domain_dirty_limits(), node_dirty_limit(), dirty_background_bytes_handler() and dirty_bytes_handler() functions in mm/page-writeback.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95054
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42145
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the MODULE_AUTHOR(), __get_agent(), send_handler(), recv_handler() and ib_umad_read() functions in drivers/infiniband/core/user_mad.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95063
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42226
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the handle_tx_event() function in drivers/usb/host/xhci-ring.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95562
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42253
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the pca953x_irq_bus_sync_unlock() function in drivers/gpio/gpio-pca953x.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96160
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43817
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the include/linux/virtio_net.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96541
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43897
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the __udp_gso_segment() function in net/ipv4/udp_offload.c, within the tcp_gso_segment() function in net/ipv4/tcp_offload.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96512
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44931
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the gpiochip_get_desc() function in drivers/gpio/gpiolib.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96516
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44932
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the idpf_vport_intr_napi_dis_all() and idpf_vport_intr_rel() functions in drivers/net/ethernet/intel/idpf/idpf_txrx.c, within the idpf_vport_stop(), idpf_vport_open() and idpf_send_map_unmap_queue_vector_msg() functions in drivers/net/ethernet/intel/idpf/idpf_lib.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96711
Risk: Low
CVSSv4.0: 5.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2024-44947
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the fuse_notify_store() function in fs/fuse/dev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU96880
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44958
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the sched_cpu_deactivate() function in kernel/sched/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96831
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44964
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the idpf_rx_init_buf_tail(), idpf_vport_open(), idpf_init_task(), idpf_initiate_soft_reset() and idpf_open() functions in drivers/net/ethernet/intel/idpf/idpf_lib.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96855
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44995
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the hns3_reset_notify_uninit_enet() function in drivers/net/ethernet/hisilicon/hns3/hns3_enet.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97169
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45016
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the netem_enqueue() function in net/sched/sch_netem.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97193
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45025
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the free_fdtable_rcu(), copy_fdtable() and dup_fd() functions in fs/file.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97266
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46678
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the bond_ipsec_add_sa(), bond_ipsec_add_sa_all(), bond_ipsec_del_sa(), bond_ipsec_del_sa_all(), bond_setup() and bond_uninit() functions in drivers/net/bonding/bond_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97278
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46681
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the pktgen_thread_worker() and pg_net_init() functions in net/core/pktgen.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97572
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46716
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the msgdma_free_descriptor() and msgdma_chan_desc_cleanup() functions in drivers/dma/altera-msgdma.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97534
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46719
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the drivers/usb/typec/ucsi/ucsi.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97566
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46754
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the net/core/filter.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97520
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46770
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ice_prepare_for_reset(), ice_update_pf_netdev_link() and ice_rebuild() functions in drivers/net/ethernet/intel/ice/ice_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97568
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46775
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the perform_link_training_with_retries() function in drivers/gpu/drm/amd/display/dc/link/protocols/link_dp_training.c, within the hubbub2_program_watermarks() function in drivers/gpu/drm/amd/display/dc/dcn20/dcn20_hubbub.c, within the dc_dmub_srv_cmd_run_list() and dc_dmub_srv_get_visual_confirm_color_cmd() functions in drivers/gpu/drm/amd/display/dc/dc_dmub_srv.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97550
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46777
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the udf_fill_partdesc_info() function in fs/udf/super.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97501
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46800
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the qdisc_enqueue() function in net/sched/sch_netem.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97838
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46802
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the resource_build_bit_depth_reduction_params() function in drivers/gpu/drm/amd/display/dc/core/dc_resource.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97827
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46804
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the read() and write() functions in drivers/gpu/drm/amd/display/modules/hdcp/hdcp_ddc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97793
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46805
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the psp_xgmi_reflect_topology_info() function in drivers/gpu/drm/amd/amdgpu/amdgpu_psp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97794
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46807
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the amdgpu_device_recover_vram() function in drivers/gpu/drm/amd/amdgpu/amdgpu_device.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97813
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46809
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the get_ss_info_v3_1(), get_ss_info_from_internal_ss_info_tbl_V2_1(), get_ss_info_from_ss_info_table(), get_ss_entry_number_from_ss_info_tbl(), get_ss_entry_number_from_internal_ss_info_tbl_v2_1() and get_ss_entry_number_from_internal_ss_info_tbl_V3_1() functions in drivers/gpu/drm/amd/display/dc/bios/bios_parser.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97796
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46810
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the tc_irq_handler() function in drivers/gpu/drm/bridge/tc358767.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97812
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46811
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to reachable assertion within the dcn321_update_bw_bounding_box_fpu() function in drivers/gpu/drm/amd/display/dc/dml/dcn321/dcn321_fpu.c, within the dcn32_update_bw_bounding_box_fpu() function in drivers/gpu/drm/amd/display/dc/dml/dcn32/dcn32_fpu.c, within the dcn303_fpu_update_bw_bounding_box() function in drivers/gpu/drm/amd/display/dc/dml/dcn303/dcn303_fpu.c, within the dcn302_fpu_update_bw_bounding_box() function in drivers/gpu/drm/amd/display/dc/dml/dcn302/dcn302_fpu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97845
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46812
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ModeSupportAndSystemConfiguration() function in drivers/gpu/drm/amd/display/dc/dml/display_mode_vba.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97785
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46813
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the dc_get_link_at_index() function in drivers/gpu/drm/amd/display/dc/core/dc_link_exports.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97844
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46814
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the hdmi_14_process_transaction() and dp_11_process_transaction() functions in drivers/gpu/drm/amd/display/dc/hdcp/hdcp_msg.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97843
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46815
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the build_watermark_ranges() function in drivers/gpu/drm/amd/display/dc/clk_mgr/dcn21/rn_clk_mgr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97829
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46816
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the amdgpu_dm_initialize_drm_device() function in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97830
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46817
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the amdgpu_dm_initialize_drm_device() function in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97842
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46818
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the is_pin_busy(), set_pin_busy(), set_pin_free(), dal_gpio_service_lock() and dal_gpio_service_unlock() functions in drivers/gpu/drm/amd/display/dc/gpio/gpio_service.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97797
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46819
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the nbio_v7_4_handle_ras_controller_intr_no_bifring() function in drivers/gpu/drm/amd/amdgpu/nbio_v7_4.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97841
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46821
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the navi10_get_current_clk_freq_by_table(), navi10_emit_clk_levels(), navi10_print_clk_levels() and navi10_force_clk_levels() functions in drivers/gpu/drm/amd/pm/swsmu/smu11/navi10_ppt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97839
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46826
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the fs/binfmt_elf.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97786
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46828
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the net/sched/sch_cake.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97789
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46834
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ethtool_set_channels() function in net/ethtool/ioctl.c, within the ethtool_get_max_rxfh_channel() function in net/ethtool/common.c, within the ethnl_set_channels() function in net/ethtool/channels.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97831
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46835
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the gfx_v11_0_hw_init() function in drivers/gpu/drm/amd/amdgpu/gfx_v11_0.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97808
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46840
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the reada_walk_down(), walk_down_proc(), do_walk_down() and walk_up_proc() functions in fs/btrfs/extent-tree.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97814
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46841
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the walk_down_proc() function in fs/btrfs/extent-tree.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97779
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46842
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the lpfc_get_sfp_info_wait() function in drivers/scsi/lpfc/lpfc_els.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97820
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46848
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the adl_get_hybrid_cpu_type() and intel_pmu_init() functions in arch/x86/events/intel/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97781
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46849
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the axg_card_add_tdm_loopback() function in sound/soc/meson/axg-card.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97782
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46853
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nxp_fspi_fill_txfifo() function in drivers/spi/spi-nxp-fspi.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97776
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46854
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the dpaa_start_xmit() function in drivers/net/ethernet/freescale/dpaa/dpaa_eth.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97777
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46855
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the nft_socket_eval() function in net/netfilter/nft_socket.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97801
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46857
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mlx5_eswitch_set_vepa() and mlx5_eswitch_get_vepa() functions in drivers/net/ethernet/mellanox/mlx5/core/esw/legacy.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97791
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46859
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the DEVICE_ATTR_RW(), acpi_pcc_hotkey_resume() and acpi_pcc_hotkey_add() functions in drivers/platform/x86/panasonic-laptop.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97825
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46864
CWE-ID:
CWE-665 - Improper Initialization
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper initialization within the hv_machine_shutdown() function in arch/x86/kernel/cpu/mshyperv.c, within the EXPORT_SYMBOL_GPL(), register_syscore_ops() and wrmsrl() functions in arch/x86/hyperv/hv_init.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98381
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46871
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98370
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47660
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __fsnotify_recalc_mask() function in fs/notify/mark.c, within the fsnotify_sb_delete(), __fsnotify_update_child_dentry_flags() and __fsnotify_parent() functions in fs/notify/fsnotify.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98371
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47661
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the dmub_abm_set_pipe() function in drivers/gpu/drm/amd/display/dc/hwss/dcn21/dcn21_hwseq.c, within the dmub_abm_set_pipe() function in drivers/gpu/drm/amd/display/dc/dce/dmub_abm_lcd.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98372
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47663
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the ad9834_write_frequency() function in drivers/staging/iio/frequency/ad9834.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98373
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47664
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the hisi_spi_probe() function in drivers/spi/spi-hisi-kunpeng.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98379
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47665
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the hci_dma_init() function in drivers/i3c/master/mipi-i3c-hci/dma.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98380
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47667
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the RTL GENMASK(), to_keystone_pcie(), ks_pcie_start_link() and ks_pcie_quirk() functions in drivers/pci/controller/dwc/pci-keystone.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98376
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47668
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the __genradix_ptr_alloc() function in lib/generic-radix-tree.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98367
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47669
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nilfs_segctor_abort_construction() and nilfs_segctor_do_construct() functions in fs/nilfs2/segment.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98365
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47670
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ocfs2_listxattr(), ocfs2_xattr_find_entry(), ocfs2_xattr_ibody_get(), ocfs2_xattr_ibody_find() and ocfs2_xattr_block_find() functions in fs/ocfs2/xattr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98377
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47671
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the usbtmc_create_urb() function in drivers/usb/class/usbtmc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98368
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47672
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the iwl_mvm_flush_no_vif() and iwl_mvm_mac_flush() functions in drivers/net/wireless/intel/iwlwifi/mvm/mac80211.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98375
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47673
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the iwl_mvm_stop_device() function in drivers/net/wireless/intel/iwlwifi/mvm/ops.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98598
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47674
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the remap_p4d_range() and remap_pfn_range_notrack() functions in mm/memory.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99031
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47679
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the spin_lock() function in fs/inode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98916
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47682
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the sd_read_block_characteristics() function in drivers/scsi/sd.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98980
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47684
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the include/net/tcp.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99087
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47685
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the nf_reject_ip6_tcphdr_put() function in net/ipv6/netfilter/nf_reject_ipv6.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98983
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47692
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __cld_pipe_inprogress_downcall() function in fs/nfsd/nfs4recover.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99176
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47693
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ib_cache_setup_one() function in drivers/infiniband/core/cache.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98921
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47695
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the init_conns() function in drivers/infiniband/ulp/rtrs/rtrs-clt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98899
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47696
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the iw_cm_init() function in drivers/infiniband/core/iwcm.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98920
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47697
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the rtl2830_pid_filter() function in drivers/media/dvb-frontends/rtl2830.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98919
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47698
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the rtl2832_pid_filter() function in drivers/media/dvb-frontends/rtl2832.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98985
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47699
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the nilfs_btree_root_broken() function in fs/nilfs2/btree.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98898
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47701
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ext4_find_inline_entry() function in fs/ext4/inline.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98986
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47704
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the set_hpo_dp_throttled_vcp_size() and disable_hpo_dp_link_output() functions in drivers/gpu/drm/amd/display/dc/link/hwss/link_hwss_hpo_dp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98987
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47705
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the blk_add_partition() function in block/partitions/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98897
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47706
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the bfq_init_rq() function in block/bfq-iosched.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98988
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47707
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the rt6_uncached_list_flush_dev() function in net/ipv6/route.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99177
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47709
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the bcm_notify() function in net/can/bcm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99033
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47710
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the sock_hash_free() function in net/core/sock_map.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98895
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47712
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the wilc_parse_join_bss_param() function in drivers/net/wireless/microchip/wilc1000/hif.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99032
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47713
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ieee80211_do_stop() function in net/mac80211/iface.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98894
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47718
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the rtw_wait_firmware_completion() function in drivers/net/wireless/realtek/rtw88/main.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98991
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47720
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn30_set_output_transfer_func() function in drivers/gpu/drm/amd/display/dc/dcn30/dcn30_hwseq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98915
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47723
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the diAlloc() function in fs/jfs/jfs_imap.c, within the dbMount() and dbNextAG() functions in fs/jfs/jfs_dmap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99231
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47727
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the handle_mmio() function in arch/x86/coco/tdx/tdx.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98856
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47728
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the BPF_CALL_5() function in net/core/filter.c, within the BPF_CALL_4() function in kernel/bpf/syscall.c, within the BPF_CALL_4() function in kernel/bpf/helpers.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99227
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47730
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the qm_set_vf_mse(), qm_controller_reset_prepare(), qm_master_ooo_check() and qm_soft_reset_prepare() functions in drivers/crypto/hisilicon/qm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99025
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47735
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the hns_roce_lock_cqs() and hns_roce_unlock_cqs() functions in drivers/infiniband/hw/hns/hns_roce_qp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99078
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47737
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the idmap_id_to_name() function in fs/nfsd/nfs4idmap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99175
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47738
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ieee80211_tx_h_rate_ctrl() function in net/mac80211/tx.c, within the ieee80211_send_scan_probe_req() function in net/mac80211/scan.c, within the ieee80211_get_tx_rates() function in net/mac80211/rate.c, within the ieee80211_mgmt_tx() function in net/mac80211/offchannel.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99021
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47739
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the padata_do_serial() function in kernel/padata.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99188
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47742
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the fw_abort_batch_reqs() and _request_firmware() functions in drivers/base/firmware_loader/main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99229
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47745
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the SYSCALL_DEFINE5() function in mm/mmap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98888
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47747
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ether3_remove() function in drivers/net/ethernet/seeq/ether3.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98889
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47748
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the vhost_vdpa_setup_vq_irq(), vhost_vdpa_vring_ioctl() and vhost_vdpa_open() functions in drivers/vhost/vdpa.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98971
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47749
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the act_establish() and act_open_rpl() functions in drivers/infiniband/hw/cxgb4/cm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98976
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47756
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ks_pcie_quirk() function in drivers/pci/controller/dwc/pci-keystone.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98913
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47757
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the nilfs_btree_check_delete() function in fs/nilfs2/btree.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98974
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49850
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the bpf_core_apply() function in kernel/bpf/btf.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98860
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49851
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the tpm2_flush_space() function in drivers/char/tpm/tpm2-space.c, within the tpm_dev_transmit() function in drivers/char/tpm/tpm-dev-common.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98891
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49852
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the efc_nport_vport_del() function in drivers/scsi/elx/libefc/efc_nport.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98893
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49855
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nbd_requeue_cmd() and nbd_xmit_timeout() functions in drivers/block/nbd.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99152
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49858
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the efi_retrieve_tpm2_eventlog() function in drivers/firmware/efi/libstub/tpm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99194
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49860
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the acpi_device_setup_files() function in drivers/acpi/device_sysfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99086
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49861
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the sizeof() function in net/core/filter.c, within the sizeof() function in kernel/trace/bpf_trace.c, within the arg_type_is_dynptr() function in kernel/bpf/verifier.c, within the sizeof() function in kernel/bpf/syscall.c, within the sizeof() function in kernel/bpf/helpers.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98970
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49863
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the vhost_scsi_get_req() function in drivers/vhost/scsi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99146
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49866
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the osnoise_hotplug_workfn() function in kernel/trace/trace_osnoise.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98885
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49867
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the close_ctree() function in fs/btrfs/disk-io.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98969
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49868
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the btrfs_update_reloc_root() function in fs/btrfs/relocation.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98851
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49870
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the cachefiles_open_file(), fput() and cachefiles_look_up_object() functions in fs/cachefiles/namei.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98968
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49871
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the adp5589_keypad_add() and adp5589_probe() functions in drivers/input/keyboard/adp5589-keys.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99020
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49875
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the fs/nfsd/vfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98966
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49877
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the fs/ocfs2/buffer_head_io.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98965
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49879
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the omapdrm_init() and omap_gem_deinit() functions in drivers/gpu/drm/omapdrm/omap_drv.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98852
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49881
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the get_ext_path() function in fs/ext4/move_extent.c, within the ext4_find_extent() and ext4_split_extent_at() functions in fs/ext4/extents.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99076
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49882
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the ext4_ext_try_to_merge_up() function in fs/ext4/extents.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98866
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49883
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the fs/ext4/extents.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98867
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49884
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ext4_split_extent_at() and ext4_ext_dirty() functions in fs/ext4/extents.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98903
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49886
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the _isst_if_get_pci_dev() function in drivers/platform/x86/intel/speed_select_if/isst_if_common.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98964
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49890
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the init_overdrive_limits() function in drivers/gpu/drm/amd/pm/powerplay/hwmgr/processpptables.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98963
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49891
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the lpfc_sli_flush_io_rings() function in drivers/scsi/lpfc/lpfc_sli.c, within the lpfc_abort_handler() function in drivers/scsi/lpfc/lpfc_scsi.c, within the lpfc_dev_loss_tmo_callbk() function in drivers/scsi/lpfc/lpfc_hbadisc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99224
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49892
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the calculate_ttu_cursor() function in drivers/gpu/drm/amd/display/dc/dml/dcn21/display_rq_dlg_calc_21.c, within the calculate_ttu_cursor() function in drivers/gpu/drm/amd/display/dc/dml/dcn20/display_rq_dlg_calc_20v2.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98912
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49894
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the cm_helper_translate_curve_to_degamma_hw_format() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_cm_common.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98911
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49895
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the cm3_helper_translate_curve_to_degamma_hw_format() function in drivers/gpu/drm/amd/display/dc/dcn30/dcn30_cm_common.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98962
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49896
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the are_stream_backends_same() function in drivers/gpu/drm/amd/display/dc/core/dc_resource.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99072
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49897
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the dcn32_add_phantom_pipes() function in drivers/gpu/drm/amd/display/dc/resource/dcn32/dcn32_resource.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99225
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49899
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the CalculateVMGroupAndRequestTimes() function in drivers/gpu/drm/amd/display/dc/dml2/dml21/src/dml2_core/dml2_core_shared.c, within the get_bytes_per_element() function in drivers/gpu/drm/amd/display/dc/dml/dml1_display_rq_dlg_calc.c, within the calculate_ttu_cursor() function in drivers/gpu/drm/amd/display/dc/dml/dcn20/display_rq_dlg_calc_20.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99084
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49900
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the ea_get() function in fs/jfs/xattr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98960
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49901
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the msm_gpu_init() function in drivers/gpu/drm/msm/msm_gpu.c, within the adreno_gpu_init() function in drivers/gpu/drm/msm/adreno/adreno_gpu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98910
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49902
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the dbAdjTree() and dbFindLeaf() functions in fs/jfs/jfs_dmap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98869
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49903
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the jfs_issue_discard() and jfs_ioc_trim() functions in fs/jfs/jfs_discard.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98958
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49905
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the handle_cursor_update() function in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_plane.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98940
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49906
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn20_program_pipe() function in drivers/gpu/drm/amd/display/dc/hwss/dcn20/dcn20_hwseq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98925
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49907
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dc_allow_idle_optimizations() function in drivers/gpu/drm/amd/display/dc/core/dc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98939
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49908
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the amdgpu_dm_update_cursor() function in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98938
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49909
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn32_set_output_transfer_func() function in drivers/gpu/drm/amd/display/dc/hwss/dcn32/dcn32_hwseq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98936
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49911
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn20_set_output_transfer_func() function in drivers/gpu/drm/amd/display/dc/hwss/dcn20/dcn20_hwseq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98935
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49912
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the planes_changed_for_existing_stream() function in drivers/gpu/drm/amd/display/dc/core/dc_resource.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98934
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49913
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the commit_planes_for_stream() function in drivers/gpu/drm/amd/display/dc/core/dc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98933
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49914
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn20_program_pipe() function in drivers/gpu/drm/amd/display/dc/hwss/dcn20/dcn20_hwseq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98930
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49917
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn30_init_hw() function in drivers/gpu/drm/amd/display/dc/hwss/dcn30/dcn30_hwseq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98929
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49918
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn32_acquire_idle_pipe_for_head_pipe_in_layer() function in drivers/gpu/drm/amd/display/dc/resource/dcn32/dcn32_resource.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98928
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49919
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn201_acquire_free_pipe_for_layer() function in drivers/gpu/drm/amd/display/dc/resource/dcn201/dcn201_resource.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98927
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49920
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn32_is_center_timing() function in drivers/gpu/drm/amd/display/dc/resource/dcn32/dcn32_resource_helpers.c, within the dcn32_enable_phantom_plane() function in drivers/gpu/drm/amd/display/dc/resource/dcn32/dcn32_resource.c, within the bw_calcs_data_update_from_pplib() function in drivers/gpu/drm/amd/display/dc/resource/dce112/dce112_resource.c, within the reset_dio_stream_encoder() function in drivers/gpu/drm/amd/display/dc/link/hwss/link_hwss_dio.c, within the dp_set_test_pattern() function in drivers/gpu/drm/amd/display/dc/link/accessories/link_dp_cts.c, within the dcn20_post_unlock_program_front_end() and dcn20_wait_for_blank_complete() functions in drivers/gpu/drm/amd/display/dc/hwss/dcn20/dcn20_hwseq.c, within the hwss_build_fast_sequence() function in drivers/gpu/drm/amd/display/dc/core/dc_hw_sequencer.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98926
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49921
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dp_verify_link_cap_with_retries() function in drivers/gpu/drm/amd/display/dc/link/protocols/link_dp_capability.c, within the dcn35_init_hw() and dcn35_calc_blocks_to_gate() functions in drivers/gpu/drm/amd/display/dc/hwss/dcn35/dcn35_hwseq.c, within the dcn31_init_hw() function in drivers/gpu/drm/amd/display/dc/hwss/dcn31/dcn31_hwseq.c, within the dcn10_init_hw() function in drivers/gpu/drm/amd/display/dc/hwss/dcn10/dcn10_hwseq.c, within the dce110_edp_backlight_control() function in drivers/gpu/drm/amd/display/dc/hwss/dce110/dce110_hwseq.c, within the hubp2_is_flip_pending() function in drivers/gpu/drm/amd/display/dc/hubp/dcn20/dcn20_hubp.c, within the hubp1_is_flip_pending() function in drivers/gpu/drm/amd/display/dc/hubp/dcn10/dcn10_hubp.c, within the dce11_pplib_apply_display_requirements() function in drivers/gpu/drm/amd/display/dc/clk_mgr/dce110/dce110_clk_mgr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98924
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49922
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the create_validate_stream_for_sink(), amdgpu_dm_commit_streams() and amdgpu_dm_atomic_commit_tail() functions in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98950
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49923
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn21_fast_validate_bw() function in drivers/gpu/drm/amd/display/dc/resource/dcn21/dcn21_resource.c, within the dcn20_fast_validate_bw() function in drivers/gpu/drm/amd/display/dc/resource/dcn20/dcn20_resource.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98870
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49924
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the pxafb_remove() function in drivers/video/fbdev/pxafb.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98871
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49925
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the efifb_probe(), pm_runtime_put() and efifb_remove() functions in drivers/video/fbdev/efifb.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98957
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49929
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the iwl_mvm_tx_mpdu() and iwl_mvm_tx_skb_sta() functions in drivers/net/wireless/intel/iwlwifi/mvm/tx.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98908
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49930
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the drivers/net/wireless/ath/ath11k/dp_rx.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98906
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49933
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ioc_forgive_debts() function in block/blk-iocost.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98872
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49934
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the dump_mapping() function in fs/inode.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99178
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49935
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a race condition within the exit_round_robin() function in drivers/acpi/acpi_pad.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98873
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49936
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the xenvif_new_hash() and xenvif_flush_hash() functions in drivers/net/xen-netback/hash.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99041
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49938
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ath9k_hif_usb_rx_cb() and ath9k_hif_usb_reg_in_cb() functions in drivers/net/wireless/ath/ath9k/hif_usb.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99019
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49939
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the rtw89_ops_add_interface() function in drivers/net/wireless/realtek/rtw89/mac80211.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98875
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49945
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ncsi_unregister_dev() function in net/ncsi/ncsi-manage.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99018
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49946
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ppp_channel_bridge_input() function in drivers/net/ppp/ppp_generic.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99170
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49947
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the include/linux/virtio_net.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98952
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49949
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the qdisc_pkt_len_init() function in net/core/dev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98876
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49950
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the l2cap_connect_req() function in net/bluetooth/l2cap_core.c, within the hci_remote_features_evt() function in net/bluetooth/hci_event.c, within the hci_acldata_packet() function in net/bluetooth/hci_core.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99149
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49954
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the static_call_module_notify() function in kernel/static_call_inline.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99172
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49955
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the battery_hook_unregister_unlocked() and battery_hook_register() functions in drivers/acpi/battery.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98941
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49957
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ocfs2_journal_shutdown() function in fs/ocfs2/journal.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99044
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49958
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ocfs2_reflink_xattr_inline() function in fs/ocfs2/xattr.c, within the __ocfs2_reflink() function in fs/ocfs2/refcounttree.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99017
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49959
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __releases() function in fs/jbd2/checkpoint.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98877
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49960
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the flush_work() function in fs/ext4/super.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98949
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49962
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the acpi_db_convert_to_package() function in drivers/acpi/acpica/dbconvert.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99150
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49963
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the bcm2835_mbox_probe() function in drivers/mailbox/bcm2835-mailbox.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99016
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49965
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ocfs2_read_blocks() function in fs/ocfs2/buffer_head_io.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99070
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49966
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the ocfs2_local_read_info() function in fs/ocfs2/quota_local.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99223
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49967
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the do_split() function in fs/ext4/namei.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99226
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49968
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ext4_feature_set_ok() function in fs/ext4/super.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98905
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49969
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the cm3_helper_translate_curve_to_hw_format() function in drivers/gpu/drm/amd/display/dc/dcn30/dcn30_cm_common.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99156
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49973
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the drivers/net/ethernet/realtek/r8169_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99220
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49974
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the nfs4_state_create_net() function in fs/nfsd/nfs4state.c, within the nfs4_put_copy() and nfsd4_copy() functions in fs/nfsd/nfs4proc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98854
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49975
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the __create_xol_area() function in kernel/events/uprobes.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98878
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49981
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the venus_remove() function in drivers/media/platform/qcom/venus/core.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98879
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49982
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ata_rw_frameinit(), aoecmd_ata_rw(), resend(), probe() and aoecmd_ata_id() functions in drivers/block/aoe/aoecmd.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98880
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49983
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ext4_ext_replay_update_ex() function in fs/ext4/extents.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99013
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49985
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the stm32f7_i2c_runtime_suspend() and stm32f7_i2c_runtime_resume() functions in drivers/i2c/busses/i2c-stm32f7.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99058
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49989
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the link_destruct() function in drivers/gpu/drm/amd/display/dc/link/link_factory.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98882
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49991
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the pqm_clean_queue_resource() function in drivers/gpu/drm/amd/amdkfd/kfd_process_queue_manager.c, within the kfd_process_destroy_pdds() function in drivers/gpu/drm/amd/amdkfd/kfd_process.c, within the kfd_free_mqd_cp() function in drivers/gpu/drm/amd/amdkfd/kfd_mqd_manager.c, within the deallocate_hiq_sdma_mqd() function in drivers/gpu/drm/amd/amdkfd/kfd_device_queue_manager.c, within the kfd_gtt_sa_fini() and kgd2kfd_device_exit() functions in drivers/gpu/drm/amd/amdkfd/kfd_device.c, within the kfd_ioctl_create_queue() function in drivers/gpu/drm/amd/amdkfd/kfd_chardev.c, within the amdgpu_amdkfd_free_gtt_mem() function in drivers/gpu/drm/amd/amdgpu/amdgpu_amdkfd.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99012
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49993
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the free_iommu() and raw_spin_lock() functions in drivers/iommu/intel/dmar.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99192
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49995
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the bearer_name_validate() function in net/tipc/bearer.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99101
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49996
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the parse_reparse_posix() and cifs_reparse_point_to_fattr() functions in fs/smb/client/reparse.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98943
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50000
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mlx5e_tir_builder_alloc() function in drivers/net/ethernet/mellanox/mlx5/core/en/tir.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99157
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50001
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the mlx5e_sq_xmit_mpwqe() function in drivers/net/ethernet/mellanox/mlx5/core/en_tx.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98942
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50002
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the static_call_del_module() function in kernel/static_call_inline.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99218
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50003
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the dmub_hpd_callback() function in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99011
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50006
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ext4_ind_migrate() function in fs/ext4/migrate.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98902
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50007
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the HPIMSGX__init() function in sound/pci/asihpi/hpimsgx.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99167
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50008
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the mwifiex_ret_802_11_scan_ext() function in drivers/net/wireless/marvell/mwifiex/scan.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98923
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50009
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the amd_pstate_adjust_perf() and amd_pstate_init_prefcore() functions in drivers/cpufreq/amd-pstate.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98850
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50013
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the exfat_load_bitmap() function in fs/exfat/balloc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99010
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50014
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __ext4_fill_super() function in fs/ext4/super.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99219
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50017
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ident_pud_init() function in arch/x86/mm/ident_map.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99160
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50019
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the kthread_unpark() function in kernel/kthread.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99121
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50024
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the __netlink_clear_multicast_users() function in net/netlink/af_netlink.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99001
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50025
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the fnic_probe() function in drivers/scsi/fnic/fnic_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99129
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50026
CWE-ID:
CWE-665 - Improper Initialization
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper initialization within the wd33c93_intr() function in drivers/scsi/wd33c93.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99184
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50028
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the thermal_genl_cmd_tz_get_trip(), thermal_genl_cmd_tz_get_temp() and thermal_genl_cmd_tz_get_gov() functions in drivers/thermal/thermal_netlink.c, within the thermal_zone_get_by_id() function in drivers/thermal/thermal_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99135
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50031
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the v3d_perfmon_open_file() and v3d_perfmon_idr_del() functions in drivers/gpu/drm/v3d/v3d_perfmon.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99082
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50033
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the slhc_remember() function in drivers/net/slip/slhc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99083
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50035
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the ppp_async_encode() function in drivers/net/ppp/ppp_async.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98999
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50041
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the i40e_vc_get_vf_resources_msg() function in drivers/net/ethernet/intel/i40e/i40e_virtchnl_pf.c, within the i40e_add_mac_filter() function in drivers/net/ethernet/intel/i40e/i40e_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98997
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50044
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the rfcomm_sock_ioctl() function in net/bluetooth/rfcomm/sock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99038
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50045
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the br_nf_dev_queue_xmit() function in net/bridge/br_netfilter_hooks.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98996
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50046
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nfs42_complete_copies() function in fs/nfs/nfs4state.c, within the handle_async_copy() function in fs/nfs/nfs42proc.c, within the nfs_alloc_server() function in fs/nfs/client.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98995
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50047
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the SMB2_negotiate() function in fs/smb/client/smb2pdu.c, within the smb2_get_enc_key(), crypt_message(), smb3_init_transform_rq() and decrypt_raw_data() functions in fs/smb/client/smb2ops.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99061
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50048
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the set_con2fb_map() function in drivers/video/fbdev/core/fbcon.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99203
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50049
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the dc_validate_seamless_boot_timing() function in drivers/gpu/drm/amd/display/dc/core/dc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99057
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50055
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the bus_remove_file() function in drivers/base/bus.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99205
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50058
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the uart_shutdown() function in drivers/tty/serial/serial_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99125
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50059
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the switchtec_ntb_remove() function in drivers/ntb/hw/mscc/ntb_hw_switchtec.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99126
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50061
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the cdns_i3c_master_remove() function in drivers/i3c/master/i3c-master-cdns.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99039
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50062
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the rtrs_srv_info_req_done() and post_recv_path() functions in drivers/infiniband/ulp/rtrs/rtrs-srv.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99190
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50063
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the bpf_prog_map_compatible() function in kernel/bpf/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99434
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50067
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the uprobe_buffer_init(), prepare_uprobe_buffer() and __uprobe_trace_func() functions in kernel/trace/trace_uprobe.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99442
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50073
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the gsm_cleanup_mux() function in drivers/tty/n_gsm.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99445
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50074
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the do_active_device(), do_autoprobe(), do_hardware_base_addr(), do_hardware_irq(), do_hardware_dma() and do_hardware_modes() functions in drivers/parport/procfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99453
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50077
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the iso_init() function in net/bluetooth/iso.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99454
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50078
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the bt_exit() function in net/bluetooth/af_bluetooth.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99456
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50081
CWE-ID:
CWE-665 - Improper Initialization
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper initialization within the blk_mq_init_allocated_queue() function in block/blk-mq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99451
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50082
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the rq_qos_wake_function() function in block/blk-rq-qos.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99849
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50089
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the nfdicf_init() and main() functions in fs/unicode/mkutf8data.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99842
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50093
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the proc_thermal_pci_remove() function in drivers/thermal/intel/int340x_thermal/processor_thermal_device_pci.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99828
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50095
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the retry_send() and timeout_sends() functions in drivers/infiniband/core/mad.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99843
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50096
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the nouveau_dmem_fault_copy_one() function in drivers/gpu/drm/nouveau/nouveau_dmem.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99823
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50098
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ufshcd_wl_shutdown() function in drivers/ufs/core/ufshcd.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99824
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50099
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the arm_probe_decode_insn() and arm_kprobe_decode_insn() functions in arch/arm64/kernel/probes/decode-insn.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99814
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50103
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the asoc_qcom_lpass_cpu_platform_probe() function in sound/soc/qcom/lpass-cpu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99839
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50108
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the is_psr_su_specific_panel() function in drivers/gpu/drm/amd/display/modules/power/power_helpers.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99801
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50110
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the copy_to_user_auth() function in net/xfrm/xfrm_user.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99810
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50115
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the nested_svm_get_tdp_pdptr() function in arch/x86/kvm/svm/nested.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99831
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50116
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the nilfs_forget_buffer() and nilfs_clear_dirty_page() functions in fs/nilfs2/page.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99818
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50117
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the amdgpu_atif_call() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acpi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99805
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50124
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ISO_CONN_TIMEOUT(), iso_sock_timeout() and iso_conn_del() functions in net/bluetooth/iso.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99806
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50125
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the SCO_CONN_TIMEOUT(), sco_sock_timeout() and sco_conn_del() functions in net/bluetooth/sco.c, within the bt_sock_unlink() function in net/bluetooth/af_bluetooth.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99808
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50127
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the taprio_change() function in net/sched/sch_taprio.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99812
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50128
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the drivers/net/wwan/wwan_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99833
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50131
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the traceprobe_parse_event_name() function in kernel/trace/trace_probe.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99837
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50134
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the hgsmi_update_pointer_shape() function in drivers/gpu/drm/vboxvideo/hgsmi_base.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99826
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50135
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nvme_pci_nr_maps() and nvme_reset_work() functions in drivers/nvme/host/pci.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99827
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50138
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the bpf_ringbuf_alloc() and __bpf_ringbuf_reserve() functions in kernel/bpf/ringbuf.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100077
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50141
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the efi_pa_va_lookup(), acpi_parse_prmt() and acpi_platformrt_space_handler() functions in drivers/acpi/prmt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100071
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50146
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the _mlx5e_remove() function in drivers/net/ethernet/mellanox/mlx5/core/en_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100072
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50147
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mlx5_cmd_comp_handler(), mlx5_cmd_trigger_completions() and mlx5_cmd_enable() functions in drivers/net/ethernet/mellanox/mlx5/core/cmd.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100087
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50148
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the bnep_init() function in net/bluetooth/bnep/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100059
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50150
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the typec_altmode_release() and typec_register_altmode() functions in drivers/usb/typec/class.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100061
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50153
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the target_alloc_device() function in drivers/target/target_core_device.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100062
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50154
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the reqsk_queue_unlink() and reqsk_timer_handler() functions in net/ipv4/inet_connection_sock.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100078
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50155
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nsim_dev_trap_report_work() and nsim_dev_traps_init() functions in drivers/net/netdevsim/dev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100073
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50156
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the msm_disp_state_dump_regs() and msm_disp_state_print() functions in drivers/gpu/drm/msm/disp/msm_disp_snapshot_util.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100074
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50160
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dolphin_fixups() function in sound/pci/hda/patch_cs8409.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100053
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50167
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the be_xmit() function in drivers/net/ethernet/emulex/benet/be_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100056
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50171
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the bcm_sysport_xmit() function in drivers/net/ethernet/broadcom/bcmsysport.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100154
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50179
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ceph_set_page_dirty() function in fs/ceph/addr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100137
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50180
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the sisfb_search_mode() function in drivers/video/fbdev/sis/sis_main.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100147
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50182
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the SYSCALL_DEFINE1() and secretmem_init() functions in mm/secretmem.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100126
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50183
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the lpfc_vport_delete() function in drivers/scsi/lpfc/lpfc_vport.c, within the lpfc_cmpl_ct() function in drivers/scsi/lpfc/lpfc_ct.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100143
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50184
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the virtio_pmem_flush() function in drivers/nvdimm/nd_virtio.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100122
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50186
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __sock_create() function in net/socket.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100156
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50187
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the vc4_perfmon_open_file() and vc4_perfmon_close_file() functions in drivers/gpu/drm/vc4/vc4_perfmon.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100138
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50188
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the dp83869_configure_fiber() function in drivers/net/phy/dp83869.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100145
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50189
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the amd_sfh_hid_client_init() and amd_sfh_hid_client_deinit() functions in drivers/hid/amd-sfh-hid/amd_sfh_client.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100144
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50192
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the its_build_vmapp_cmd(), its_vpe_set_affinity() and its_vpe_init() functions in drivers/irqchip/irq-gic-v3-its.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100146
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50194
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the arch_uprobe_analyze_insn() and arch_uprobe_skip_sstep() functions in arch/arm64/kernel/probes/uprobes.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100150
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50195
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the pc_clock_settime() function in kernel/time/posix-clock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100142
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50196
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the ocelot_irq_handler() function in drivers/pinctrl/pinctrl-ocelot.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100123
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50198
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the in_illuminance_period_available_show() function in drivers/iio/light/veml6030.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100151
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50201
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the radeon_encoder_clones() function in drivers/gpu/drm/radeon/radeon_encoders.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100136
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50205
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the apply_constraint_to_size() function in sound/firewire/amdtp-stream.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100141
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50208
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the bnxt_qplib_alloc_init_hwq() function in drivers/infiniband/hw/bnxt_re/qplib_res.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100148
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50209
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the bnxt_qplib_alloc_init_hwq() function in drivers/infiniband/hw/bnxt_re/qplib_res.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100190
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50215
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the nvmet_setup_dhgroup() function in drivers/nvme/target/auth.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100187
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50218
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ocfs2_remove_inode_range() function in fs/ocfs2/file.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100183
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50229
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nilfs_symlink() function in fs/nilfs2/namei.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100188
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50230
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the nilfs_clear_dirty_page() function in fs/nilfs2/page.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100199
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50232
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the ad7124_write_raw() function in drivers/iio/adc/ad7124.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100200
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50233
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the ad9832_calc_freqreg() function in drivers/staging/iio/frequency/ad9832.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100184
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50234
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the il_pci_resume() function in drivers/net/wireless/intel/iwlegacy/common.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100162
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50236
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the wmi_process_mgmt_tx_comp() and ath10k_wmi_mgmt_tx_clean_up_pending() functions in drivers/net/wireless/ath/ath10k/wmi.c, within the ath10k_wmi_tlv_op_cleanup_mgmt_tx_send() function in drivers/net/wireless/ath/ath10k/wmi-tlv.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100194
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50237
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the ieee80211_get_tx_power() function in net/mac80211/cfg.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100186
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50249
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the acpi_cppc_processor_probe() and cpc_write() functions in drivers/acpi/cppc_acpi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100180
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50255
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __hci_cmd_sync_sk() and __hci_cmd_sync_status_sk() functions in net/bluetooth/hci_sync.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100204
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50259
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the nsim_nexthop_bucket_activity_write() function in drivers/net/netdevsim/fib.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100169
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50261
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the macsec_free_netdev() function in drivers/net/macsec.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100612
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50264
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the virtio_transport_destruct() function in net/vmw_vsock/virtio_transport_common.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100610
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50265
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ocfs2_xa_remove() function in fs/ocfs2/xattr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100613
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50267
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the edge_bulk_out_data_callback() and edge_bulk_out_cmd_callback() functions in drivers/usb/serial/io_edgeport.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100618
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50268
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ucsi_ccg_update_set_new_cam_cmd() function in drivers/usb/typec/ucsi/ucsi_ccg.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100649
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50269
CWE-ID:
CWE-404 - Improper Resource Shutdown or Release
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to failure to properly release resources within the sunxi_musb_exit() function in drivers/usb/musb/sunxi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100628
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50271
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the dec_rlimit_put_ucounts() and inc_rlimit_get_ucounts() functions in kernel/ucount.c, within the __sigqueue_alloc() function in kernel/signal.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100623
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50273
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the insert_delayed_ref() function in fs/btrfs/delayed-ref.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100629
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50274
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the idpf_handle_event_link() function in drivers/net/ethernet/intel/idpf/idpf_virtchnl.c, within the idpf_initiate_soft_reset() function in drivers/net/ethernet/intel/idpf/idpf_lib.c, within the idpf_set_msglevel() function in drivers/net/ethernet/intel/idpf/idpf_ethtool.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100620
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50279
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the can_resize() function in drivers/md/dm-cache-target.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100638
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50282
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the amdgpu_debugfs_regs_smc_read() function in drivers/gpu/drm/amd/amdgpu/amdgpu_debugfs.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100639
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50287
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the tpg_precalculate_line() function in drivers/media/common/v4l2-tpg/v4l2-tpg-core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100652
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50289
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the CI_handle() and dvb_ca_ioctl() functions in drivers/staging/media/av7110/av7110_ca.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100637
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50290
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the cx24116_read_snr_pct() function in drivers/media/dvb-frontends/cx24116.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100625
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50292
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the stm32_spdifrx_remove() function in sound/soc/stm/stm32_spdifrx.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100646
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50295
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the arc_emac_tx_clean(), arc_emac_rx(), arc_emac_open(), arc_emac_set_rx_mode(), arc_free_tx_queue(), arc_free_rx_queue() and arc_emac_tx() functions in drivers/net/ethernet/arc/emac_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100627
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50298
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the enetc_sriov_configure(), enetc_pf_probe(), free_netdev() and enetc_pf_remove() functions in drivers/net/ethernet/freescale/enetc/enetc_pf.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100622
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50301
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the security/keys/keyring.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100611
Risk: Medium
CVSSv4.0: 6.8 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:A/U:Green]
CVE-ID: CVE-2024-50302
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the hid_alloc_report_buf() function in drivers/hid/hid-core.c. A local user can perform a denial of service (DoS) attack.
Note, the vulnerability is being actively exploited in the wild against Android devices.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU100720
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53052
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the io_write_prep() and io_write() functions in io_uring/io_uring.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100729
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53058
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the stmmac_tso_xmit() function in drivers/net/ethernet/stmicro/stmmac/stmmac_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100728
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53059
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the iwl_mvm_disconnect_iterator() and iwl_mvm_send_recovery_cmd() functions in drivers/net/wireless/intel/iwlwifi/mvm/fw.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100713
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53060
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the amdgpu_atif_call() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acpi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100733
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53061
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the exynos4_jpeg_parse_decode_h_tbl(), get_word_be() and s5p_jpeg_parse_hdr() functions in drivers/media/platform/s5p-jpeg/jpeg-core.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100741
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53063
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the DECLARE_RWSEM() and dvb_register_device() functions in drivers/media/dvb-core/dvbdev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100730
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53066
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the nfs_fattr_init() function in fs/nfs/inode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100708
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53068
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the EXPORT_SYMBOL_GPL(), __scmi_device_destroy() and __scmi_device_create() functions in drivers/firmware/arm_scmi/bus.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100724
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53079
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the destroy_large_folio() function in mm/page_alloc.c, within the mem_cgroup_move_account(), mem_cgroup_move_charge_pte_range(), uncharge_folio() and mem_cgroup_swapout() functions in mm/memcontrol.c, within the __folio_undo_large_rmappable() and deferred_split_folio() functions in mm/huge_memory.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100726
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53085
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the tpm_pm_suspend() and tpm_get_random() functions in drivers/char/tpm/tpm-interface.c, within the tpm_hwrng_read() function in drivers/char/tpm/tpm-chip.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100705
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53088
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the i40e_count_filters(), i40e_correct_mac_vlan_filters(), i40e_correct_vf_mac_vlan_filters(), i40e_aqc_broadcast_filter() and i40e_sync_vsi_filters() functions in drivers/net/ethernet/intel/i40e/i40e_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101102
Risk: High
CVSSv4.0: 8.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber]
CVE-ID: CVE-2024-53104
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to an out-of-bounds read error within the uvc_parse_format() function in drivers/media/usb/uvc/uvc_driver.c. A local user can trigger an out-of-bounds write and execute arbitrary code on the system.
Note, the vulnerability is being actively exploited in the wild.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU101116
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53110
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the vp_vdpa_probe() function in drivers/vdpa/virtio_pci/vp_vdpa.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise High Availability Extension 15: SP5
Development Tools Module: 15-SP5
Legacy Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
gfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default: before 5.14.21-150500.55.88.1
dlm-kmp-default: before 5.14.21-150500.55.88.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
ocfs2-kmp-default: before 5.14.21-150500.55.88.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-livepatch-SLE15-SP5_Update_21-debugsource: before 1-150500.11.5.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default: before 1-150500.11.5.1
kernel-default-livepatch: before 5.14.21-150500.55.88.1
kernel-livepatch-5_14_21-150500_55_88-default-debuginfo: before 1-150500.11.5.1
reiserfs-kmp-default: before 5.14.21-150500.55.88.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-source: before 5.14.21-150500.55.88.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.88.1
kernel-obs-build: before 5.14.21-150500.55.88.1
kernel-syms: before 5.14.21-150500.55.88.1
kernel-docs: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.88.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.88.1
kernel-zfcpdump: before 5.14.21-150500.55.88.1
kernel-devel: before 5.14.21-150500.55.88.1
kernel-macros: before 5.14.21-150500.55.88.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debugsource: before 5.14.21-150500.55.88.1
kernel-64kb-devel: before 5.14.21-150500.55.88.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.88.1
kernel-64kb: before 5.14.21-150500.55.88.1
kernel-default-debugsource: before 5.14.21-150500.55.88.1
kernel-default-debuginfo: before 5.14.21-150500.55.88.1
kernel-default-base: before 5.14.21-150500.55.88.1.150500.6.39.4
kernel-default: before 5.14.21-150500.55.88.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.