Risk | High |
Patch available | YES |
Number of vulnerabilities | 116 |
CVE-ID | CVE-2024-26924 CVE-2024-27397 CVE-2024-35839 CVE-2024-36908 CVE-2024-36915 CVE-2024-39480 CVE-2024-41042 CVE-2024-44934 CVE-2024-44996 CVE-2024-47678 CVE-2024-49854 CVE-2024-49884 CVE-2024-49915 CVE-2024-50016 CVE-2024-50018 CVE-2024-50039 CVE-2024-50047 CVE-2024-50143 CVE-2024-50154 CVE-2024-50202 CVE-2024-50203 CVE-2024-50211 CVE-2024-50228 CVE-2024-50256 CVE-2024-50262 CVE-2024-50272 CVE-2024-50278 CVE-2024-50279 CVE-2024-50280 CVE-2024-53050 CVE-2024-53064 CVE-2024-53090 CVE-2024-53099 CVE-2024-53103 CVE-2024-53105 CVE-2024-53111 CVE-2024-53113 CVE-2024-53117 CVE-2024-53118 CVE-2024-53119 CVE-2024-53120 CVE-2024-53122 CVE-2024-53125 CVE-2024-53126 CVE-2024-53127 CVE-2024-53129 CVE-2024-53130 CVE-2024-53131 CVE-2024-53133 CVE-2024-53134 CVE-2024-53136 CVE-2024-53141 CVE-2024-53142 CVE-2024-53144 CVE-2024-53146 CVE-2024-53148 CVE-2024-53150 CVE-2024-53151 CVE-2024-53154 CVE-2024-53155 CVE-2024-53156 CVE-2024-53157 CVE-2024-53158 CVE-2024-53159 CVE-2024-53160 CVE-2024-53161 CVE-2024-53162 CVE-2024-53166 CVE-2024-53169 CVE-2024-53171 CVE-2024-53173 CVE-2024-53174 CVE-2024-53179 CVE-2024-53180 CVE-2024-53188 CVE-2024-53190 CVE-2024-53191 CVE-2024-53200 CVE-2024-53201 CVE-2024-53202 CVE-2024-53206 CVE-2024-53207 CVE-2024-53208 CVE-2024-53209 CVE-2024-53210 CVE-2024-53213 CVE-2024-53214 CVE-2024-53215 CVE-2024-53216 CVE-2024-53217 CVE-2024-53222 CVE-2024-53224 CVE-2024-53229 CVE-2024-53234 CVE-2024-53237 CVE-2024-53240 CVE-2024-53241 CVE-2024-56536 CVE-2024-56539 CVE-2024-56549 CVE-2024-56551 CVE-2024-56562 CVE-2024-56566 CVE-2024-56567 CVE-2024-56576 CVE-2024-56582 CVE-2024-56599 CVE-2024-56604 CVE-2024-56605 CVE-2024-56645 CVE-2024-56667 CVE-2024-56752 CVE-2024-56754 CVE-2024-56755 CVE-2024-56756 CVE-2024-8805 |
CWE-ID | CWE-399 CWE-667 CWE-125 CWE-119 CWE-20 CWE-416 CWE-476 CWE-190 CWE-908 CWE-388 CWE-835 CWE-415 CWE-401 CWE-369 CWE-191 CWE-366 CWE-362 CWE-665 CWE-1037 CWE-284 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Public Cloud Module Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system kernel-devel-azure Operating systems & Components / Operating system package or component kernel-source-azure Operating systems & Components / Operating system package or component kernel-azure-vdso-debuginfo Operating systems & Components / Operating system package or component kernel-azure-vdso Operating systems & Components / Operating system package or component kernel-azure Operating systems & Components / Operating system package or component gfs2-kmp-azure Operating systems & Components / Operating system package or component kernel-azure-debuginfo Operating systems & Components / Operating system package or component ocfs2-kmp-azure-debuginfo Operating systems & Components / Operating system package or component kernel-syms-azure Operating systems & Components / Operating system package or component kernel-azure-extra Operating systems & Components / Operating system package or component dlm-kmp-azure Operating systems & Components / Operating system package or component kselftests-kmp-azure-debuginfo Operating systems & Components / Operating system package or component kernel-azure-devel Operating systems & Components / Operating system package or component kernel-azure-debugsource Operating systems & Components / Operating system package or component gfs2-kmp-azure-debuginfo Operating systems & Components / Operating system package or component kernel-azure-optional-debuginfo Operating systems & Components / Operating system package or component kernel-azure-devel-debuginfo Operating systems & Components / Operating system package or component reiserfs-kmp-azure-debuginfo Operating systems & Components / Operating system package or component cluster-md-kmp-azure Operating systems & Components / Operating system package or component reiserfs-kmp-azure Operating systems & Components / Operating system package or component kernel-azure-optional Operating systems & Components / Operating system package or component dlm-kmp-azure-debuginfo Operating systems & Components / Operating system package or component kselftests-kmp-azure Operating systems & Components / Operating system package or component ocfs2-kmp-azure Operating systems & Components / Operating system package or component cluster-md-kmp-azure-debuginfo Operating systems & Components / Operating system package or component kernel-azure-extra-debuginfo Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 116 vulnerabilities.
EUVDB-ID: #VU89055
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26924
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources within the nft_pipapo_remove() function in net/netfilter/nft_set_pipapo.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92027
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27397
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __nft_rbtree_insert(), nft_rbtree_deactivate() and nft_rbtree_gc() functions in net/netfilter/nft_set_rbtree.c, within the pipapo_get(), nft_pipapo_get(), nft_pipapo_insert(), pipapo_gc() and pipapo_deactivate() functions in net/netfilter/nft_set_pipapo.c, within the nft_rhash_key(), nft_rhash_cmp(), nft_rhash_lookup(), nft_rhash_get(), nft_rhash_update(), nft_rhash_insert() and nft_rhash_deactivate() functions in net/netfilter/nft_set_hash.c, within the nft_trans_gc_catchall_sync() and nf_tables_valid_genid() functions in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93386
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35839
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nf_reject6_fill_skb_dst() and nf_send_reset6() functions in net/ipv6/netfilter/nf_reject_ipv6.c, within the nf_reject_fill_skb_dst() and nf_send_reset() functions in net/ipv4/netfilter/nf_reject_ipv4.c, within the br_nf_pre_routing_finish_ipv6() function in net/bridge/br_netfilter_ipv6.c, within the br_nf_pre_routing_finish_bridge(), br_nf_ipv4_daddr_was_changed(), bridge_parent_rtable(), skb_dst_set_noref(), setup_pre_routing(), br_nf_forward_finish(), ip_sabotage_in() and br_nf_pre_routing_finish_bridge_slow() functions in net/bridge/br_netfilter_hooks.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93278
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36908
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the iocg_pay_debt() function in block/blk-iocost.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90268
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36915
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the nfc_llcp_setsockopt() function in net/nfc/llcp_sock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93827
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39480
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the kdb_printf() function in kernel/debug/kdb/kdb_io.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95003
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41042
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the nf_tables_rule_release(), nft_chain_validate(), nft_chain_validate_hooks() and nft_validate_register_store() functions in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96517
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44934
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the br_multicast_del_port() function in net/bridge/br_multicast.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96879
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44996
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the __vsock_recvmsg() function in net/vmw_vsock/vsock_bpf.c, within the __vsock_dgram_recvmsg(), vsock_connectible_recvmsg() and release_sock() functions in net/vmw_vsock/af_vsock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99030
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47678
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the icmpv6_mask_allow(), icmpv6_global_allow(), icmpv6_xrlim_allow(), icmp6_send() and icmpv6_echo_reply() functions in net/ipv6/icmp.c, within the __SPIN_LOCK_UNLOCKED(), icmpv4_mask_allow(), icmpv4_global_allow(), icmpv4_xrlim_allow(), icmp_reply() and __icmp_send() functions in net/ipv4/icmp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98892
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49854
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the bfq_prepare_request() and bfq_init_rq() functions in block/bfq-iosched.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98867
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49884
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ext4_split_extent_at() and ext4_ext_dirty() functions in fs/ext4/extents.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98932
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49915
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn32_init_hw() function in drivers/gpu/drm/amd/display/dc/hwss/dcn32/dcn32_hwseq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99090
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50016
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the dp_set_test_pattern() function in drivers/gpu/drm/amd/display/dc/link/accessories/link_dp_cts.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99091
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50018
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the NETDEVICE_SHOW_RW() and napi_defer_hard_irqs_store() functions in net/core/net-sysfs.c, within the netif_elide_gro() function in Documentation/networking/net_cachelines/net_device.rst. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99133
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50039
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the qdisc_skb_cb() function in net/sched/sch_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98995
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50047
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the SMB2_negotiate() function in fs/smb/client/smb2pdu.c, within the smb2_get_enc_key(), crypt_message(), smb3_init_transform_rq() and decrypt_raw_data() functions in fs/smb/client/smb2ops.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100084
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50143
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the udf_current_aext() function in fs/udf/inode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100062
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50154
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the reqsk_queue_unlink() and reqsk_timer_handler() functions in net/ipv4/inet_connection_sock.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100130
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50202
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the nilfs_lookup(), nilfs_do_unlink(), nilfs_rename() and nilfs_get_parent() functions in fs/nilfs2/namei.c, within the nilfs_readdir(), nilfs_find_entry() and nilfs_inode_by_name() functions in fs/nilfs2/dir.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100139
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50203
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the prepare_trampoline() function in arch/arm64/net/bpf_jit_comp.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100134
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50211
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the udf_truncate_extents() function in fs/udf/truncate.c, within the udf_try_read_meta() function in fs/udf/partition.c, within the udf_map_block(), udf_extend_file(), udf_delete_aext() and inode_bmap() functions in fs/udf/inode.c, within the udf_fiiter_init() and udf_fiiter_append_blk() functions in fs/udf/directory.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100182
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50228
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the shmem_getattr() function in mm/shmem.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100192
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50256
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the nf_reject6_fill_skb_dst() and nf_send_reset6() functions in net/ipv6/netfilter/nf_reject_ipv6.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100173
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50262
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the trie_get_next_key() function in kernel/bpf/lpm_trie.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100640
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50272
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the filemap_read() function in mm/filemap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100619
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50278
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the get_cache_dev_size() and cache_preresume() functions in drivers/md/dm-cache-target.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100620
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50279
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the can_resize() function in drivers/md/dm-cache-target.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100614
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50280
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the check_migrations(), destroy(), cache_create() and cache_ctr() functions in drivers/md/dm-cache-target.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100709
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53050
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the intel_dp_hdcp2_get_capability() function in drivers/gpu/drm/i915/display/intel_dp_hdcp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100714
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53064
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the idpf_init_hard_reset() function in drivers/net/ethernet/intel/idpf/idpf_lib.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100833
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53090
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the afs_deferred_free_worker(), afs_alloc_call(), afs_put_call(), afs_wake_up_call_waiter() and afs_wake_up_async_call() functions in fs/afs/rxrpc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100938
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53099
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the bpf_link_show_fdinfo() function in kernel/bpf/syscall.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101106
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53103
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the hvs_destruct() function in net/vmw_vsock/hyperv_transport.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101108
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53105
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the __page_cache_release() function in mm/swap.c, within the free_pages_prepare() function in mm/page_alloc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101110
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53111
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the mm/mremap.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101103
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53113
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the alloc_pages_bulk_noprof() function in mm/page_alloc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101096
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53117
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the virtio_transport_send_pkt_info() function in net/vmw_vsock/virtio_transport_common.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101097
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53118
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the vsock_sk_destruct() function in net/vmw_vsock/af_vsock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101098
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53119
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the virtio_transport_recv_listen() function in net/vmw_vsock/virtio_transport_common.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101105
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53120
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mlx5_tc_ct_entry_add_rule() function in drivers/net/ethernet/mellanox/mlx5/core/en/tc_ct.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101111
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53122
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the mptcp_rcv_space_adjust() function in net/mptcp/protocol.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101233
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53125
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the find_equal_scalars() function in kernel/bpf/verifier.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101235
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53126
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the psnet_open_pf_bar() function in drivers/vdpa/solidrun/snet_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101231
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53127
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the dw_mci_init_slot() function in drivers/mmc/host/dw_mmc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101224
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53129
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the vop_plane_atomic_async_check() function in drivers/gpu/drm/rockchip/rockchip_drm_vop.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101225
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53130
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the nilfs_grab_buffer() function in fs/nilfs2/page.c, within the nilfs_mdt_create_block() function in fs/nilfs2/mdt.c, within the nilfs_gccache_submit_read_data() function in fs/nilfs2/gcinode.c, within the nilfs_btnode_create_block() and nilfs_btnode_submit_block() functions in fs/nilfs2/btnode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101226
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53131
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __nilfs_get_page_block() function in fs/nilfs2/page.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101222
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53133
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the dc_state_create_copy() function in drivers/gpu/drm/amd/display/dc/core/dc_state.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101236
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53134
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the imx93_blk_ctrl_remove() function in drivers/pmdomain/imx/imx93-blk-ctrl.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101229
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53136
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the shmem_getattr() function in mm/shmem.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101348
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53141
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the bitmap_ip_uadt() function in net/netfilter/ipset/ip_set_bitmap_ip.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101347
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53142
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the do_name() and do_copy() functions in init/initramfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101815
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53144
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the hci_user_confirm_request_evt() function in net/bluetooth/hci_event.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101921
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53146
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the decode_cb_compound4res() function in fs/nfsd/nfs4callback.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101927
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53148
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the comedi_mmap() function in drivers/comedi/comedi_fops.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101910
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53150
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the DESC_LENGTH_CHECK(), validate_clock_source() and validate_clock_selector() functions in sound/usb/clock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101922
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53151
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the xdr_check_write_chunk() function in net/sunrpc/xprtrdma/svc_rdma_recvfrom.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101913
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53154
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the applnco_probe() function in drivers/clk/clk-apple-nco.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101917
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53155
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the ocfs2_file_write_iter() and ocfs2_file_read_iter() functions in fs/ocfs2/file.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101911
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53156
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the htc_connect_service() function in drivers/net/wireless/ath/ath9k/htc_hst.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101914
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53157
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the scpi_dvfs_get_info() function in drivers/firmware/arm_scpi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101924
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53158
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the geni_se_clk_tbl_get() function in drivers/soc/qcom/qcom-geni-se.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101925
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53159
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the store_target_temp(), store_temp_tolerance() and store_weight_temp() functions in drivers/hwmon/nct6775-core.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101926
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53160
CWE-ID:
CWE-366 - Race Condition within a Thread
Exploit availability: No
DescriptionThe vulnerability allows a local user to corrupt data.
The vulnerability exists due to a data race within the krc_count(), schedule_delayed_monitor_work() and kvfree_call_rcu() functions in kernel/rcu/tree.c. A local user can corrupt data.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101923
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53161
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the bluefield_edac_check() function in drivers/edac/bluefield_edac.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101912
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53162
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the uof_get_name() function in drivers/crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102048
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53166
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the bfq_choose_req(), bfqq_request_over_limit() and bfq_limit_depth() functions in block/bfq-iosched.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102220
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53169
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the EXPORT_SYMBOL_GPL() function in drivers/nvme/host/core.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102059
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53171
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the get_znodes_to_commit() function in fs/ubifs/tnc_commit.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102058
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53173
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nfs4_open_release() function in fs/nfs/nfs4proc.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102057
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53174
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the c_show() function in net/sunrpc/cache.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102054
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53179
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the smb2_get_sign_key(), smb2_find_smb_ses_unlocked(), smb2_calc_signature() and smb3_calc_signature() functions in fs/smb/client/smb2transport.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102222
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53180
CWE-ID:
CWE-665 - Improper Initialization
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper initialization within the snd_pcm_mmap_data_fault() function in sound/core/pcm_native.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102130
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53188
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ath12k_dp_cc_cleanup() function in drivers/net/wireless/ath/ath12k/dp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102173
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53190
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the efuse_write_1byte() and read_efuse_byte() functions in drivers/net/wireless/realtek/rtlwifi/efuse.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102194
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53191
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the ath12k_dp_free() function in drivers/net/wireless/ath/ath12k/dp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102138
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53200
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the hwss_setup_dpp() function in drivers/gpu/drm/amd/display/dc/core/dc_hw_sequencer.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102137
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53201
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn20_program_pipe() function in drivers/gpu/drm/amd/display/dc/hwss/dcn20/dcn20_hwseq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102005
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53202
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the fw_log_firmware_info() function in drivers/base/firmware_loader/main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102046
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53206
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __inet_csk_reqsk_queue_drop() function in net/ipv4/inet_connection_sock.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102176
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53207
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the mgmt_set_discoverable_complete(), mgmt_set_connectable_complete(), set_ssp_complete(), set_name_complete(), set_default_phy_complete(), start_discovery_complete(), stop_discovery_complete() and read_local_oob_ext_data_complete() functions in net/bluetooth/mgmt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102063
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53208
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the mgmt_set_powered_complete() function in net/bluetooth/mgmt.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102134
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53209
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the bnxt_set_rx_skb_mode() and bnxt_change_mtu() functions in drivers/net/ethernet/broadcom/bnxt/bnxt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102004
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53210
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the iucv_sock_recvmsg() function in net/iucv/af_iucv.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102195
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53213
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the lan78xx_probe() function in drivers/net/usb/lan78xx.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102092
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53214
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the vfio_virt_config_read() and vfio_config_do_rw() functions in drivers/vfio/pci/vfio_pci_config.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102208
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53215
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the svc_rdma_proc_init() function in net/sunrpc/xprtrdma/svc_rdma.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102356
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53216
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in fs/nfsd/export.c. A local user can execute arbitrary code with elevated privileges.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102133
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53217
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the nfsd4_process_cb_update() function in fs/nfsd/nfs4callback.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102129
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53222
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the zram_add() function in drivers/block/zram/zram_drv.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102141
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53224
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mlx5_ib_dev_res_init(), mlx5_ib_stage_delay_drop_cleanup(), mlx5_ib_stage_dev_notifier_init() and STAGE_CREATE() functions in drivers/infiniband/hw/mlx5/main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102217
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53229
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the rxe_requester() function in drivers/infiniband/sw/rxe/rxe_req.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102251
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53234
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the z_erofs_load_compact_lcluster() and z_erofs_get_extent_decompressedlen() functions in fs/erofs/zmap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102069
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53237
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __match_tty() and hci_conn_del_sysfs() functions in net/bluetooth/hci_sysfs.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101818
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-53240
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote backend to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the guest xen-netfront driver. A a malicious network backend can crash the guest OS.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101817
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53241
CWE-ID:
CWE-1037 - Processor optimization removal or modification of security-critical code
Exploit availability: No
DescriptionThe vulnerability allows a malicious guest to gain access to sensitive information.
The vulnerability exists due to implemented mitigations for hardware vulnerabilities related to Xen hypercall page implementation the guest OS is relying on to work might not be fully functional, resulting in e.g. guest user processes being able to read data they ought not have access to.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102148
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56536
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cw1200_spi_suspend() function in drivers/net/wireless/st/cw1200/cw1200_spi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102236
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56539
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the drivers/net/wireless/marvell/mwifiex/fw.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102151
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56549
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cachefiles_ondemand_fd_write_iter() and cachefiles_ondemand_fd_llseek() functions in fs/cachefiles/ondemand.c, within the cachefiles_commit_object() and cachefiles_clean_up_object() functions in fs/cachefiles/interface.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102039
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56551
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the amdgpu_vce_sw_fini() function in drivers/gpu/drm/amd/amdgpu/amdgpu_vce.c, within the amdgpu_device_fini_sw() function in drivers/gpu/drm/amd/amdgpu/amdgpu_device.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102279
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56562
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the i3c_master_put_i3c_addrs() function in drivers/i3c/master.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102170
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56566
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the check_slab(), slab_fix() and alloc_single_from_partial() functions in mm/slub.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102216
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56567
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the ad7780_write_raw() function in drivers/iio/adc/ad7780.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102229
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56576
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the tc358743_probe() function in drivers/media/i2c/tc358743.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102045
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56582
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the btrfs_encoded_read_endio() function in fs/btrfs/inode.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102108
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56599
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ath10k_sdio_remove() function in drivers/net/wireless/ath/ath10k/sdio.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102019
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56604
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the rfcomm_sock_alloc() function in net/bluetooth/rfcomm/sock.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102020
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56605
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the l2cap_sock_alloc() function in net/bluetooth/l2cap_sock.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102210
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56645
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the j1939_session_new() function in net/can/j1939/transport.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102121
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56667
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the capture_engine() function in drivers/gpu/drm/i915/i915_gpu_error.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102241
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56752
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the gf100_gr_chan_new() function in drivers/gpu/drm/nouveau/nvkm/engine/gr/gf100.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102273
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56754
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the caam_qi_init() function in drivers/crypto/caam/qi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102265
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56755
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the fs/netfs/fscache_volume.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102008
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56756
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nvme_free_host_mem(), __nvme_alloc_host_mem() and kfree() functions in drivers/nvme/host/pci.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97651
Risk: High
CVSSv4.0: 6.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-8805
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions within the implementation of the HID over GATT Profile. A remote attacker on the local network can bypass implemented security restrictions and execute arbitrary code on the target system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-devel-azure: before 6.4.0-150600.8.23.1
kernel-source-azure: before 6.4.0-150600.8.23.1
kernel-azure-vdso-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-vdso: before 6.4.0-150600.8.23.1
kernel-azure: before 6.4.0-150600.8.23.1
gfs2-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-debuginfo: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-syms-azure: before 6.4.0-150600.8.23.1
kernel-azure-extra: before 6.4.0-150600.8.23.1
dlm-kmp-azure: before 6.4.0-150600.8.23.1
kselftests-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel: before 6.4.0-150600.8.23.1
kernel-azure-debugsource: before 6.4.0-150600.8.23.1
gfs2-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-optional-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-devel-debuginfo: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure: before 6.4.0-150600.8.23.1
reiserfs-kmp-azure: before 6.4.0-150600.8.23.1
kernel-azure-optional: before 6.4.0-150600.8.23.1
dlm-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kselftests-kmp-azure: before 6.4.0-150600.8.23.1
ocfs2-kmp-azure: before 6.4.0-150600.8.23.1
cluster-md-kmp-azure-debuginfo: before 6.4.0-150600.8.23.1
kernel-azure-extra-debuginfo: before 6.4.0-150600.8.23.1
CPE2.3http://www.suse.com/support/update/announcement/2025/suse-su-20250117-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.