Risk | High |
Patch available | YES |
Number of vulnerabilities | 77 |
CVE-ID | CVE-2022-48742 CVE-2022-49033 CVE-2022-49035 CVE-2023-52434 CVE-2023-52922 CVE-2024-26976 CVE-2024-35847 CVE-2024-36484 CVE-2024-36883 CVE-2024-36886 CVE-2024-38589 CVE-2024-41013 CVE-2024-46771 CVE-2024-47141 CVE-2024-47666 CVE-2024-47678 CVE-2024-47709 CVE-2024-49925 CVE-2024-49944 CVE-2024-50039 CVE-2024-50143 CVE-2024-50151 CVE-2024-50166 CVE-2024-50199 CVE-2024-50211 CVE-2024-50228 CVE-2024-50256 CVE-2024-50262 CVE-2024-50278 CVE-2024-50280 CVE-2024-50287 CVE-2024-50299 CVE-2024-53057 CVE-2024-53101 CVE-2024-53112 CVE-2024-53136 CVE-2024-53141 CVE-2024-53144 CVE-2024-53146 CVE-2024-53150 CVE-2024-53156 CVE-2024-53157 CVE-2024-53172 CVE-2024-53173 CVE-2024-53179 CVE-2024-53198 CVE-2024-53210 CVE-2024-53214 CVE-2024-53224 CVE-2024-53239 CVE-2024-53240 CVE-2024-56531 CVE-2024-56548 CVE-2024-56551 CVE-2024-56569 CVE-2024-56570 CVE-2024-56587 CVE-2024-56599 CVE-2024-5660 CVE-2024-56603 CVE-2024-56604 CVE-2024-56605 CVE-2024-56606 CVE-2024-56616 CVE-2024-56631 CVE-2024-56642 CVE-2024-56664 CVE-2024-56704 CVE-2024-56724 CVE-2024-56756 CVE-2024-57791 CVE-2024-57849 CVE-2024-57887 CVE-2024-57888 CVE-2024-57892 CVE-2024-57893 CVE-2024-8805 |
CWE-ID | CWE-416 CWE-667 CWE-20 CWE-119 CWE-415 CWE-617 CWE-125 CWE-401 CWE-476 CWE-399 CWE-908 CWE-388 CWE-369 CWE-190 CWE-254 CWE-284 |
Exploitation vector | Network |
Public exploit | Vulnerability #40 is being exploited in the wild. |
Vulnerable software |
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Operating systems & Components / Operating system SUSE Linux Enterprise Server 12 SP5 Operating systems & Components / Operating system SUSE Linux Enterprise High Availability Extension 12 Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 12 Operating systems & Components / Operating system SUSE Linux Enterprise Server 12 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 12 Operating systems & Components / Operating system SUSE Linux Enterprise Live Patching Operating systems & Components / Operating system kernel-default-devel-debuginfo Operating systems & Components / Operating system package or component kernel-default-man Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-macros Operating systems & Components / Operating system package or component kernel-syms Operating systems & Components / Operating system package or component ocfs2-kmp-default-debuginfo Operating systems & Components / Operating system package or component kernel-default-base Operating systems & Components / Operating system package or component gfs2-kmp-default-debuginfo Operating systems & Components / Operating system package or component cluster-md-kmp-default Operating systems & Components / Operating system package or component gfs2-kmp-default Operating systems & Components / Operating system package or component dlm-kmp-default Operating systems & Components / Operating system package or component dlm-kmp-default-debuginfo Operating systems & Components / Operating system package or component ocfs2-kmp-default Operating systems & Components / Operating system package or component cluster-md-kmp-default-debuginfo Operating systems & Components / Operating system package or component kernel-default-devel Operating systems & Components / Operating system package or component kernel-default-base-debuginfo Operating systems & Components / Operating system package or component kernel-default-kgraft-devel Operating systems & Components / Operating system package or component kernel-default-kgraft Operating systems & Components / Operating system package or component kgraft-patch-4_12_14-122_244-default Operating systems & Components / Operating system package or component kernel-default-debugsource Operating systems & Components / Operating system package or component kernel-default-debuginfo Operating systems & Components / Operating system package or component kernel-default Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 77 vulnerabilities.
EUVDB-ID: #VU92897
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48742
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the rtnl_newlink() function in net/core/rtnetlink.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99009
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49033
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the btrfs_qgroup_inherit() function in fs/btrfs/qgroup.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102285
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49035
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the s5p_cec_irq_handler() function in drivers/media/cec/platform/s5p/s5p_cec.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU88283
Risk: Medium
CVSSv4.0: 6.1 [CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-52434
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the smb2_parse_contexts() function when parsing SMB packets. A remote user can send specially crafted SMB traffic to the affected system, trigger memory corruption and execute arbitrary code.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101033
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52922
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the bcm_release() function in net/can/bcm.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90774
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26976
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the async_pf_execute(), kvm_clear_async_pf_completion_queue(), kvm_check_async_pf_completion() and kvm_setup_async_pf() functions in virt/kvm/async_pf.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90891
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35847
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the its_vpe_irq_domain_alloc() function in drivers/irqchip/irq-gic-v3-its.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93039
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36484
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to reachable assertion within the __inet_accept() function in net/ipv4/af_inet.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90272
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36883
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the net_alloc_generic() and register_pernet_operations() functions in net/core/net_namespace.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90049
Risk: High
CVSSv4.0: 7.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-36886
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to a use-after-free error within the tipc_buf_append() function in net/tipc/msg.c when processing fragmented TIPC messages. A remote attacker can send specially crafted packets to the system, trigger a use-after-free error and execute arbitrary code on the system in the context of the kernel.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92365
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38589
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nr_add_node() and nr_del_node() functions in net/netrom/nr_route.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94835
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41013
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the __xfs_dir3_data_check() function in fs/xfs/libxfs/xfs_dir2_data.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97485
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46771
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the bcm_notify() function in net/can/bcm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102924
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47141
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the pr_fmt(), pinmux_can_be_used_for_gpio(), pin_request(), pin_free(), pinmux_enable_setting(), pinmux_disable_setting() and pinmux_pins_show() functions in drivers/pinctrl/pinmux.c, within the pinctrl_register_one_pin() function in drivers/pinctrl/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98366
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47666
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the pm8001_phy_control() function in drivers/scsi/pm8001/pm8001_sas.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99030
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47678
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the icmpv6_mask_allow(), icmpv6_global_allow(), icmpv6_xrlim_allow(), icmp6_send() and icmpv6_echo_reply() functions in net/ipv6/icmp.c, within the __SPIN_LOCK_UNLOCKED(), icmpv4_mask_allow(), icmpv4_global_allow(), icmpv4_xrlim_allow(), icmp_reply() and __icmp_send() functions in net/ipv4/icmp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99177
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47709
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the bcm_notify() function in net/can/bcm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98871
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49925
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the efifb_probe(), pm_runtime_put() and efifb_remove() functions in drivers/video/fbdev/efifb.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98953
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49944
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the sctp_listen_start() function in net/sctp/socket.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99133
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50039
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the qdisc_skb_cb() function in net/sched/sch_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100084
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50143
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the udf_current_aext() function in fs/udf/inode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100066
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50151
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the SMB2_ioctl_init() function in fs/cifs/smb2pdu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100052
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50166
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the mac_probe() and mac_remove() functions in drivers/net/ethernet/freescale/fman/mac.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100120
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50199
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the unuse_mm() function in mm/swapfile.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100134
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50211
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the udf_truncate_extents() function in fs/udf/truncate.c, within the udf_try_read_meta() function in fs/udf/partition.c, within the udf_map_block(), udf_extend_file(), udf_delete_aext() and inode_bmap() functions in fs/udf/inode.c, within the udf_fiiter_init() and udf_fiiter_append_blk() functions in fs/udf/directory.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100182
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50228
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the shmem_getattr() function in mm/shmem.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100192
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50256
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the nf_reject6_fill_skb_dst() and nf_send_reset6() functions in net/ipv6/netfilter/nf_reject_ipv6.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100173
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50262
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the trie_get_next_key() function in kernel/bpf/lpm_trie.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100619
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50278
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the get_cache_dev_size() and cache_preresume() functions in drivers/md/dm-cache-target.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100614
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50280
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the check_migrations(), destroy(), cache_create() and cache_ctr() functions in drivers/md/dm-cache-target.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100639
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50287
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the tpg_precalculate_line() function in drivers/media/common/v4l2-tpg/v4l2-tpg-core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100631
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50299
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the sctp_sf_ootb() function in net/sctp/sm_statefuns.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100707
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53057
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the qdisc_tree_reduce_backlog() function in net/sched/sch_api.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100940
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53101
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the ocfs2_setattr() function in fs/ocfs2/file.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101107
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53112
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ocfs2_commit_trans() function in fs/ocfs2/resize.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101229
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53136
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the shmem_getattr() function in mm/shmem.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101348
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53141
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the bitmap_ip_uadt() function in net/netfilter/ipset/ip_set_bitmap_ip.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101815
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53144
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the hci_user_confirm_request_evt() function in net/bluetooth/hci_event.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101921
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53146
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the decode_cb_compound4res() function in fs/nfsd/nfs4callback.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101910
Risk: High
CVSSv4.0: 6.8 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber]
CVE-ID: CVE-2024-53150
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the DESC_LENGTH_CHECK(), validate_clock_source() and validate_clock_selector() functions in sound/usb/clock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU101911
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53156
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the htc_connect_service() function in drivers/net/wireless/ath/ath9k/htc_hst.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101914
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53157
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the scpi_dvfs_get_info() function in drivers/firmware/arm_scpi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102249
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53172
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the alloc_ai(), scan_fast() and ubi_attach() functions in drivers/mtd/ubi/attach.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102058
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53173
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nfs4_open_release() function in fs/nfs/nfs4proc.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102054
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53179
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the smb2_get_sign_key(), smb2_find_smb_ses_unlocked(), smb2_calc_signature() and smb3_calc_signature() functions in fs/smb/client/smb2transport.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102006
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53198
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the xenbus_dev_probe() function in drivers/xen/xenbus/xenbus_probe.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102004
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53210
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the iucv_sock_recvmsg() function in net/iucv/af_iucv.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102092
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53214
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the vfio_virt_config_read() and vfio_config_do_rw() functions in drivers/vfio/pci/vfio_pci_config.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102141
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53224
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mlx5_ib_dev_res_init(), mlx5_ib_stage_delay_drop_cleanup(), mlx5_ib_stage_dev_notifier_init() and STAGE_CREATE() functions in drivers/infiniband/hw/mlx5/main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102070
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53239
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the usb6fire_chip_abort(), usb6fire_chip_destroy(), usb6fire_chip_probe() and usb6fire_chip_disconnect() functions in sound/usb/6fire/chip.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101818
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-53240
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote backend to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the guest xen-netfront driver. A a malicious network backend can crash the guest OS.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102180
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56531
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the snd_usb_caiaq_input_free() function in sound/usb/caiaq/input.c, within the setup_card(), init_card() and snd_disconnect() functions in sound/usb/caiaq/device.c, within the snd_usb_caiaq_audio_init() function in sound/usb/caiaq/audio.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102075
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56548
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the hfsplus_read_wrapper() function in fs/hfsplus/wrapper.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102039
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56551
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the amdgpu_vce_sw_fini() function in drivers/gpu/drm/amd/amdgpu/amdgpu_vce.c, within the amdgpu_device_fini_sw() function in drivers/gpu/drm/amd/amdgpu/amdgpu_device.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102126
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56569
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ftrace_mod_callback() function in kernel/trace/ftrace.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102280
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56570
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ovl_dentry_init_flags() function in fs/overlayfs/util.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102104
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56587
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the brightness_show() and max_brightness_show() functions in drivers/leds/led-class.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102108
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56599
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ath10k_sdio_remove() function in drivers/net/wireless/ath/ath10k/sdio.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103509
Risk: High
CVSSv4.0: 6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:H/E:U/U:Amber]
CVE-ID: CVE-2024-5660
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a malicious guest to compromise the hypervisor.
The vulnerability exists due to incorrect memory address translation when Hardware Page Aggregation (HPA) is enabled and Stage-1 and/or Stage-2 translation is enabled for the active translation regime. A malicious guest can bypass Stage-2 translation and/or GPT protection and compromise the host in certain hypervisor environments.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102018
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56603
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the can_create() function in net/can/af_can.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102019
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56604
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the rfcomm_sock_alloc() function in net/bluetooth/rfcomm/sock.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102020
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56605
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the l2cap_sock_alloc() function in net/bluetooth/l2cap_sock.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102021
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56606
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the packet_create() function in net/packet/af_packet.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102082
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56616
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the drm_dp_decode_sideband_msg_hdr() function in drivers/gpu/drm/display/drm_dp_mst_topology.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102024
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56631
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the sg_release() function in drivers/scsi/sg.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102029
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56642
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cleanup_bearer() function in net/tipc/udp_media.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102034
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56664
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the sock_map_lookup_sys() function in net/core/sock_map.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102192
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56704
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the xen_9pfs_front_free() function in net/9p/trans_xen.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102224
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56724
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the bxt_wcove_tmu_irq_handler() and bxt_wcove_tmu_probe() functions in drivers/platform/x86/intel/bxtwc_tmu.c, within the ARRAY_SIZE() and bxtwc_probe() functions in drivers/mfd/intel_soc_pmic_bxtwc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102008
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56756
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nvme_free_host_mem(), __nvme_alloc_host_mem() and kfree() functions in drivers/nvme/host/pci.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102990
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57791
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the smc_clc_wait_msg() function in net/smc/smc_clc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102912
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57849
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cpumsf_pmu_stop() function in arch/s390/kernel/perf_cpum_sf.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102907
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57887
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the adv7533_parse_dt() function in drivers/gpu/drm/bridge/adv7511/adv7533.c, within the adv7511_probe(), i2c_unregister_device() and adv7511_remove() functions in drivers/gpu/drm/bridge/adv7511/adv7511_drv.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102977
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57888
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the workqueue_softirq_dead(), __flush_workqueue() and start_flush_work() functions in kernel/workqueue.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102905
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57892
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the brelse() function in fs/ocfs2/quota_local.c, within the ocfs2_get_next_id() function in fs/ocfs2/quota_global.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102918
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57893
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the DEFINE_SPINLOCK() and snd_seq_oss_synth_sysex() functions in sound/core/seq/oss/seq_oss_synth.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97651
Risk: High
CVSSv4.0: 6.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-8805
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions within the implementation of the HID over GATT Profile. A remote attacker on the local network can bypass implemented security restrictions and execute arbitrary code on the target system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.244.1
kernel-default-man: before 4.12.14-122.244.1
kernel-source: before 4.12.14-122.244.1
kernel-devel: before 4.12.14-122.244.1
kernel-macros: before 4.12.14-122.244.1
kernel-syms: before 4.12.14-122.244.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-base: before 4.12.14-122.244.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1
cluster-md-kmp-default: before 4.12.14-122.244.1
gfs2-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default: before 4.12.14-122.244.1
dlm-kmp-default-debuginfo: before 4.12.14-122.244.1
ocfs2-kmp-default: before 4.12.14-122.244.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1
kernel-default-devel: before 4.12.14-122.244.1
kernel-default-base-debuginfo: before 4.12.14-122.244.1
kernel-default-kgraft-devel: before 4.12.14-122.244.1
kernel-default-kgraft: before 4.12.14-122.244.1
kgraft-patch-4_12_14-122_244-default: before 1-8.5.1
kernel-default-debugsource: before 4.12.14-122.244.1
kernel-default-debuginfo: before 4.12.14-122.244.1
kernel-default: before 4.12.14-122.244.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.