SUSE update for the Linux Kernel



| Updated: 2025-04-08
Risk High
Patch available YES
Number of vulnerabilities 77
CVE-ID CVE-2022-48742
CVE-2022-49033
CVE-2022-49035
CVE-2023-52434
CVE-2023-52922
CVE-2024-26976
CVE-2024-35847
CVE-2024-36484
CVE-2024-36883
CVE-2024-36886
CVE-2024-38589
CVE-2024-41013
CVE-2024-46771
CVE-2024-47141
CVE-2024-47666
CVE-2024-47678
CVE-2024-47709
CVE-2024-49925
CVE-2024-49944
CVE-2024-50039
CVE-2024-50143
CVE-2024-50151
CVE-2024-50166
CVE-2024-50199
CVE-2024-50211
CVE-2024-50228
CVE-2024-50256
CVE-2024-50262
CVE-2024-50278
CVE-2024-50280
CVE-2024-50287
CVE-2024-50299
CVE-2024-53057
CVE-2024-53101
CVE-2024-53112
CVE-2024-53136
CVE-2024-53141
CVE-2024-53144
CVE-2024-53146
CVE-2024-53150
CVE-2024-53156
CVE-2024-53157
CVE-2024-53172
CVE-2024-53173
CVE-2024-53179
CVE-2024-53198
CVE-2024-53210
CVE-2024-53214
CVE-2024-53224
CVE-2024-53239
CVE-2024-53240
CVE-2024-56531
CVE-2024-56548
CVE-2024-56551
CVE-2024-56569
CVE-2024-56570
CVE-2024-56587
CVE-2024-56599
CVE-2024-5660
CVE-2024-56603
CVE-2024-56604
CVE-2024-56605
CVE-2024-56606
CVE-2024-56616
CVE-2024-56631
CVE-2024-56642
CVE-2024-56664
CVE-2024-56704
CVE-2024-56724
CVE-2024-56756
CVE-2024-57791
CVE-2024-57849
CVE-2024-57887
CVE-2024-57888
CVE-2024-57892
CVE-2024-57893
CVE-2024-8805
CWE-ID CWE-416
CWE-667
CWE-20
CWE-119
CWE-415
CWE-617
CWE-125
CWE-401
CWE-476
CWE-399
CWE-908
CWE-388
CWE-369
CWE-190
CWE-254
CWE-284
Exploitation vector Network
Public exploit Vulnerability #40 is being exploited in the wild.
Vulnerable software
SUSE Linux Enterprise Server 12 SP5 LTSS Extended
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 12 SP5
Operating systems & Components / Operating system

SUSE Linux Enterprise High Availability Extension 12
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications 12
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 12
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing 12
Operating systems & Components / Operating system

SUSE Linux Enterprise Live Patching
Operating systems & Components / Operating system

kernel-default-devel-debuginfo
Operating systems & Components / Operating system package or component

kernel-default-man
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

kernel-macros
Operating systems & Components / Operating system package or component

kernel-syms
Operating systems & Components / Operating system package or component

ocfs2-kmp-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-default-base
Operating systems & Components / Operating system package or component

gfs2-kmp-default-debuginfo
Operating systems & Components / Operating system package or component

cluster-md-kmp-default
Operating systems & Components / Operating system package or component

gfs2-kmp-default
Operating systems & Components / Operating system package or component

dlm-kmp-default
Operating systems & Components / Operating system package or component

dlm-kmp-default-debuginfo
Operating systems & Components / Operating system package or component

ocfs2-kmp-default
Operating systems & Components / Operating system package or component

cluster-md-kmp-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-default-devel
Operating systems & Components / Operating system package or component

kernel-default-base-debuginfo
Operating systems & Components / Operating system package or component

kernel-default-kgraft-devel
Operating systems & Components / Operating system package or component

kernel-default-kgraft
Operating systems & Components / Operating system package or component

kgraft-patch-4_12_14-122_244-default
Operating systems & Components / Operating system package or component

kernel-default-debugsource
Operating systems & Components / Operating system package or component

kernel-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-default
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 77 vulnerabilities.

1) Use-after-free

EUVDB-ID: #VU92897

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48742

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the rtnl_newlink() function in net/core/rtnetlink.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper locking

EUVDB-ID: #VU99009

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49033

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the btrfs_qgroup_inherit() function in fs/btrfs/qgroup.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Input validation error

EUVDB-ID: #VU102285

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49035

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the s5p_cec_irq_handler() function in drivers/media/cec/platform/s5p/s5p_cec.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Buffer overflow

EUVDB-ID: #VU88283

Risk: Medium

CVSSv4.0: 6.1 [CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-52434

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the smb2_parse_contexts() function when parsing SMB packets. A remote user can send specially crafted SMB traffic to the affected system, trigger memory corruption and execute arbitrary code.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Use-after-free

EUVDB-ID: #VU101033

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52922

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the bcm_release() function in net/can/bcm.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Improper locking

EUVDB-ID: #VU90774

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26976

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the async_pf_execute(), kvm_clear_async_pf_completion_queue(), kvm_check_async_pf_completion() and kvm_setup_async_pf() functions in virt/kvm/async_pf.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Double free

EUVDB-ID: #VU90891

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35847

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the its_vpe_irq_domain_alloc() function in drivers/irqchip/irq-gic-v3-its.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Reachable assertion

EUVDB-ID: #VU93039

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36484

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to reachable assertion within the __inet_accept() function in net/ipv4/af_inet.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Out-of-bounds read

EUVDB-ID: #VU90272

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36883

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the net_alloc_generic() and register_pernet_operations() functions in net/core/net_namespace.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Use-after-free

EUVDB-ID: #VU90049

Risk: High

CVSSv4.0: 7.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2024-36886

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a use-after-free error within the tipc_buf_append() function in net/tipc/msg.c when processing fragmented TIPC messages. A remote attacker can send specially crafted packets to the system, trigger a use-after-free error and execute arbitrary code on the system in the context of the kernel.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Improper locking

EUVDB-ID: #VU92365

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38589

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the nr_add_node() and nr_del_node() functions in net/netrom/nr_route.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Out-of-bounds read

EUVDB-ID: #VU94835

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41013

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the __xfs_dir3_data_check() function in fs/xfs/libxfs/xfs_dir2_data.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Memory leak

EUVDB-ID: #VU97485

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46771

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the bcm_notify() function in net/can/bcm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) NULL pointer dereference

EUVDB-ID: #VU102924

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47141

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the pr_fmt(), pinmux_can_be_used_for_gpio(), pin_request(), pin_free(), pinmux_enable_setting(), pinmux_disable_setting() and pinmux_pins_show() functions in drivers/pinctrl/pinmux.c, within the pinctrl_register_one_pin() function in drivers/pinctrl/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Improper locking

EUVDB-ID: #VU98366

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47666

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the pm8001_phy_control() function in drivers/scsi/pm8001/pm8001_sas.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Improper locking

EUVDB-ID: #VU99030

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47678

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the icmpv6_mask_allow(), icmpv6_global_allow(), icmpv6_xrlim_allow(), icmp6_send() and icmpv6_echo_reply() functions in net/ipv6/icmp.c, within the __SPIN_LOCK_UNLOCKED(), icmpv4_mask_allow(), icmpv4_global_allow(), icmpv4_xrlim_allow(), icmp_reply() and __icmp_send() functions in net/ipv4/icmp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Resource management error

EUVDB-ID: #VU99177

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47709

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the bcm_notify() function in net/can/bcm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Use-after-free

EUVDB-ID: #VU98871

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49925

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the efifb_probe(), pm_runtime_put() and efifb_remove() functions in drivers/video/fbdev/efifb.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) NULL pointer dereference

EUVDB-ID: #VU98953

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49944

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the sctp_listen_start() function in net/sctp/socket.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Resource management error

EUVDB-ID: #VU99133

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50039

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the qdisc_skb_cb() function in net/sched/sch_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Use of uninitialized resource

EUVDB-ID: #VU100084

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50143

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the udf_current_aext() function in fs/udf/inode.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Out-of-bounds read

EUVDB-ID: #VU100066

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50151

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the SMB2_ioctl_init() function in fs/cifs/smb2pdu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Memory leak

EUVDB-ID: #VU100052

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50166

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the mac_probe() and mac_remove() functions in drivers/net/ethernet/freescale/fman/mac.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Use-after-free

EUVDB-ID: #VU100120

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50199

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the unuse_mm() function in mm/swapfile.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) Improper error handling

EUVDB-ID: #VU100134

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50211

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the udf_truncate_extents() function in fs/udf/truncate.c, within the udf_try_read_meta() function in fs/udf/partition.c, within the udf_map_block(), udf_extend_file(), udf_delete_aext() and inode_bmap() functions in fs/udf/inode.c, within the udf_fiiter_init() and udf_fiiter_append_blk() functions in fs/udf/directory.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) Improper locking

EUVDB-ID: #VU100182

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50228

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the shmem_getattr() function in mm/shmem.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

27) Improper error handling

EUVDB-ID: #VU100192

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50256

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the nf_reject6_fill_skb_dst() and nf_send_reset6() functions in net/ipv6/netfilter/nf_reject_ipv6.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

28) Out-of-bounds read

EUVDB-ID: #VU100173

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50262

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the trie_get_next_key() function in kernel/bpf/lpm_trie.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

29) Out-of-bounds read

EUVDB-ID: #VU100619

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50278

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the get_cache_dev_size() and cache_preresume() functions in drivers/md/dm-cache-target.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

30) Use-after-free

EUVDB-ID: #VU100614

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50280

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the check_migrations(), destroy(), cache_create() and cache_ctr() functions in drivers/md/dm-cache-target.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

31) Division by zero

EUVDB-ID: #VU100639

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50287

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the tpg_precalculate_line() function in drivers/media/common/v4l2-tpg/v4l2-tpg-core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

32) Input validation error

EUVDB-ID: #VU100631

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50299

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the sctp_sf_ootb() function in net/sctp/sm_statefuns.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

33) Use-after-free

EUVDB-ID: #VU100707

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53057

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the qdisc_tree_reduce_backlog() function in net/sched/sch_api.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

34) Use of uninitialized resource

EUVDB-ID: #VU100940

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53101

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the ocfs2_setattr() function in fs/ocfs2/file.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

35) Improper locking

EUVDB-ID: #VU101107

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53112

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ocfs2_commit_trans() function in fs/ocfs2/resize.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

36) Improper locking

EUVDB-ID: #VU101229

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53136

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the shmem_getattr() function in mm/shmem.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

37) Input validation error

EUVDB-ID: #VU101348

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53141

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the bitmap_ip_uadt() function in net/netfilter/ipset/ip_set_bitmap_ip.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

38) Input validation error

EUVDB-ID: #VU101815

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53144

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the hci_user_confirm_request_evt() function in net/bluetooth/hci_event.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

39) Integer overflow

EUVDB-ID: #VU101921

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53146

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the decode_cb_compound4res() function in fs/nfsd/nfs4callback.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

40) Out-of-bounds read

EUVDB-ID: #VU101910

Risk: High

CVSSv4.0: 6.8 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber]

CVE-ID: CVE-2024-53150

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the DESC_LENGTH_CHECK(), validate_clock_source() and validate_clock_selector() functions in sound/usb/clock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.

41) Out-of-bounds read

EUVDB-ID: #VU101911

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53156

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the htc_connect_service() function in drivers/net/wireless/ath/ath9k/htc_hst.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

42) NULL pointer dereference

EUVDB-ID: #VU101914

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53157

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the scpi_dvfs_get_info() function in drivers/firmware/arm_scpi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

43) Resource management error

EUVDB-ID: #VU102249

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53172

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the alloc_ai(), scan_fast() and ubi_attach() functions in drivers/mtd/ubi/attach.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

44) Use-after-free

EUVDB-ID: #VU102058

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53173

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the nfs4_open_release() function in fs/nfs/nfs4proc.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

45) Use-after-free

EUVDB-ID: #VU102054

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53179

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the smb2_get_sign_key(), smb2_find_smb_ses_unlocked(), smb2_calc_signature() and smb3_calc_signature() functions in fs/smb/client/smb2transport.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

46) Memory leak

EUVDB-ID: #VU102006

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53198

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the xenbus_dev_probe() function in drivers/xen/xenbus/xenbus_probe.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

47) Memory leak

EUVDB-ID: #VU102004

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53210

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the iucv_sock_recvmsg() function in net/iucv/af_iucv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

48) Out-of-bounds read

EUVDB-ID: #VU102092

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53214

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the vfio_virt_config_read() and vfio_config_do_rw() functions in drivers/vfio/pci/vfio_pci_config.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

49) NULL pointer dereference

EUVDB-ID: #VU102141

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53224

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mlx5_ib_dev_res_init(), mlx5_ib_stage_delay_drop_cleanup(), mlx5_ib_stage_dev_notifier_init() and STAGE_CREATE() functions in drivers/infiniband/hw/mlx5/main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

50) Use-after-free

EUVDB-ID: #VU102070

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53239

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the usb6fire_chip_abort(), usb6fire_chip_destroy(), usb6fire_chip_probe() and usb6fire_chip_disconnect() functions in sound/usb/6fire/chip.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

51) NULL pointer dereference

EUVDB-ID: #VU101818

Risk: Medium

CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2024-53240

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote backend to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the guest xen-netfront driver. A a malicious network backend can crash the guest OS.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

52) Improper locking

EUVDB-ID: #VU102180

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56531

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the snd_usb_caiaq_input_free() function in sound/usb/caiaq/input.c, within the setup_card(), init_card() and snd_disconnect() functions in sound/usb/caiaq/device.c, within the snd_usb_caiaq_audio_init() function in sound/usb/caiaq/audio.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

53) Use-after-free

EUVDB-ID: #VU102075

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56548

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the hfsplus_read_wrapper() function in fs/hfsplus/wrapper.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

54) Use-after-free

EUVDB-ID: #VU102039

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56551

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the amdgpu_vce_sw_fini() function in drivers/gpu/drm/amd/amdgpu/amdgpu_vce.c, within the amdgpu_device_fini_sw() function in drivers/gpu/drm/amd/amdgpu/amdgpu_device.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

55) NULL pointer dereference

EUVDB-ID: #VU102126

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56569

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ftrace_mod_callback() function in kernel/trace/ftrace.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

56) Input validation error

EUVDB-ID: #VU102280

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56570

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ovl_dentry_init_flags() function in fs/overlayfs/util.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

57) NULL pointer dereference

EUVDB-ID: #VU102104

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56587

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the brightness_show() and max_brightness_show() functions in drivers/leds/led-class.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

58) NULL pointer dereference

EUVDB-ID: #VU102108

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56599

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ath10k_sdio_remove() function in drivers/net/wireless/ath/ath10k/sdio.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

59) Security features bypass

EUVDB-ID: #VU103509

Risk: High

CVSSv4.0: 6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:H/E:U/U:Amber]

CVE-ID: CVE-2024-5660

CWE-ID: CWE-254 - Security Features

Exploit availability: No

Description

The vulnerability allows a malicious guest to compromise the hypervisor.

The vulnerability exists due to incorrect memory address translation when Hardware Page Aggregation (HPA) is enabled and Stage-1 and/or Stage-2 translation is enabled for the active translation regime. A malicious guest can bypass Stage-2 translation and/or GPT protection and compromise the host in certain hypervisor environments.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

60) Use-after-free

EUVDB-ID: #VU102018

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56603

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the can_create() function in net/can/af_can.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

61) Use-after-free

EUVDB-ID: #VU102019

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56604

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the rfcomm_sock_alloc() function in net/bluetooth/rfcomm/sock.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

62) Use-after-free

EUVDB-ID: #VU102020

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56605

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the l2cap_sock_alloc() function in net/bluetooth/l2cap_sock.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

63) Use-after-free

EUVDB-ID: #VU102021

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56606

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the packet_create() function in net/packet/af_packet.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

64) Out-of-bounds read

EUVDB-ID: #VU102082

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56616

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the drm_dp_decode_sideband_msg_hdr() function in drivers/gpu/drm/display/drm_dp_mst_topology.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

65) Use-after-free

EUVDB-ID: #VU102024

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56631

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the sg_release() function in drivers/scsi/sg.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

66) Use-after-free

EUVDB-ID: #VU102029

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56642

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cleanup_bearer() function in net/tipc/udp_media.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

67) Use-after-free

EUVDB-ID: #VU102034

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56664

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the sock_map_lookup_sys() function in net/core/sock_map.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

68) Double free

EUVDB-ID: #VU102192

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56704

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the xen_9pfs_front_free() function in net/9p/trans_xen.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

69) Resource management error

EUVDB-ID: #VU102224

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56724

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the bxt_wcove_tmu_irq_handler() and bxt_wcove_tmu_probe() functions in drivers/platform/x86/intel/bxtwc_tmu.c, within the ARRAY_SIZE() and bxtwc_probe() functions in drivers/mfd/intel_soc_pmic_bxtwc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

70) Use-after-free

EUVDB-ID: #VU102008

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56756

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the nvme_free_host_mem(), __nvme_alloc_host_mem() and kfree() functions in drivers/nvme/host/pci.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

71) Input validation error

EUVDB-ID: #VU102990

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57791

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the smc_clc_wait_msg() function in net/smc/smc_clc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

72) Use-after-free

EUVDB-ID: #VU102912

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57849

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cpumsf_pmu_stop() function in arch/s390/kernel/perf_cpum_sf.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

73) Use-after-free

EUVDB-ID: #VU102907

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57887

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the adv7533_parse_dt() function in drivers/gpu/drm/bridge/adv7511/adv7533.c, within the adv7511_probe(), i2c_unregister_device() and adv7511_remove() functions in drivers/gpu/drm/bridge/adv7511/adv7511_drv.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

74) Buffer overflow

EUVDB-ID: #VU102977

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57888

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the workqueue_softirq_dead(), __flush_workqueue() and start_flush_work() functions in kernel/workqueue.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

75) Use-after-free

EUVDB-ID: #VU102905

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57892

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the brelse() function in fs/ocfs2/quota_local.c, within the ocfs2_get_next_id() function in fs/ocfs2/quota_global.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

76) Out-of-bounds read

EUVDB-ID: #VU102918

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57893

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the DEFINE_SPINLOCK() and snd_seq_oss_synth_sysex() functions in sound/core/seq/oss/seq_oss_synth.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

77) Improper access control

EUVDB-ID: #VU97651

Risk: High

CVSSv4.0: 6.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2024-8805

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions within the implementation of the HID over GATT Profile. A remote attacker on the local network can bypass implemented security restrictions and execute arbitrary code on the target system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.244.1

kernel-default-man: before 4.12.14-122.244.1

kernel-source: before 4.12.14-122.244.1

kernel-devel: before 4.12.14-122.244.1

kernel-macros: before 4.12.14-122.244.1

kernel-syms: before 4.12.14-122.244.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-base: before 4.12.14-122.244.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.244.1

cluster-md-kmp-default: before 4.12.14-122.244.1

gfs2-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default: before 4.12.14-122.244.1

dlm-kmp-default-debuginfo: before 4.12.14-122.244.1

ocfs2-kmp-default: before 4.12.14-122.244.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.244.1

kernel-default-devel: before 4.12.14-122.244.1

kernel-default-base-debuginfo: before 4.12.14-122.244.1

kernel-default-kgraft-devel: before 4.12.14-122.244.1

kernel-default-kgraft: before 4.12.14-122.244.1

kgraft-patch-4_12_14-122_244-default: before 1-8.5.1

kernel-default-debugsource: before 4.12.14-122.244.1

kernel-default-debuginfo: before 4.12.14-122.244.1

kernel-default: before 4.12.14-122.244.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###