Risk | High |
Patch available | YES |
Number of vulnerabilities | 343 |
CVE-ID | CVE-2023-52489 CVE-2023-52923 CVE-2024-26596 CVE-2024-26924 CVE-2024-27397 CVE-2024-35839 CVE-2024-36476 CVE-2024-36908 CVE-2024-36915 CVE-2024-39282 CVE-2024-39480 CVE-2024-41042 CVE-2024-43913 CVE-2024-44934 CVE-2024-44996 CVE-2024-45828 CVE-2024-46680 CVE-2024-46765 CVE-2024-46800 CVE-2024-46896 CVE-2024-47141 CVE-2024-47143 CVE-2024-47678 CVE-2024-47809 CVE-2024-48873 CVE-2024-48881 CVE-2024-49569 CVE-2024-49854 CVE-2024-49884 CVE-2024-49915 CVE-2024-49944 CVE-2024-49951 CVE-2024-49952 CVE-2024-49998 CVE-2024-50016 CVE-2024-50018 CVE-2024-50039 CVE-2024-50047 CVE-2024-50051 CVE-2024-50106 CVE-2024-50143 CVE-2024-50151 CVE-2024-50154 CVE-2024-50199 CVE-2024-50202 CVE-2024-50203 CVE-2024-50211 CVE-2024-50228 CVE-2024-50252 CVE-2024-50256 CVE-2024-50262 CVE-2024-50272 CVE-2024-50278 CVE-2024-50279 CVE-2024-50280 CVE-2024-50296 CVE-2024-50299 CVE-2024-52332 CVE-2024-53043 CVE-2024-53050 CVE-2024-53051 CVE-2024-53055 CVE-2024-53056 CVE-2024-53064 CVE-2024-53090 CVE-2024-53091 CVE-2024-53095 CVE-2024-53099 CVE-2024-53103 CVE-2024-53105 CVE-2024-53110 CVE-2024-53111 CVE-2024-53113 CVE-2024-53117 CVE-2024-53118 CVE-2024-53119 CVE-2024-53120 CVE-2024-53121 CVE-2024-53122 CVE-2024-53125 CVE-2024-53126 CVE-2024-53127 CVE-2024-53129 CVE-2024-53130 CVE-2024-53131 CVE-2024-53133 CVE-2024-53134 CVE-2024-53136 CVE-2024-53138 CVE-2024-53141 CVE-2024-53142 CVE-2024-53144 CVE-2024-53146 CVE-2024-53148 CVE-2024-53150 CVE-2024-53151 CVE-2024-53154 CVE-2024-53155 CVE-2024-53156 CVE-2024-53157 CVE-2024-53158 CVE-2024-53159 CVE-2024-53160 CVE-2024-53161 CVE-2024-53162 CVE-2024-53164 CVE-2024-53166 CVE-2024-53168 CVE-2024-53169 CVE-2024-53170 CVE-2024-53171 CVE-2024-53172 CVE-2024-53173 CVE-2024-53174 CVE-2024-53175 CVE-2024-53179 CVE-2024-53180 CVE-2024-53185 CVE-2024-53188 CVE-2024-53190 CVE-2024-53191 CVE-2024-53194 CVE-2024-53195 CVE-2024-53196 CVE-2024-53197 CVE-2024-53198 CVE-2024-53200 CVE-2024-53201 CVE-2024-53202 CVE-2024-53206 CVE-2024-53207 CVE-2024-53208 CVE-2024-53209 CVE-2024-53210 CVE-2024-53213 CVE-2024-53214 CVE-2024-53215 CVE-2024-53216 CVE-2024-53217 CVE-2024-53222 CVE-2024-53224 CVE-2024-53227 CVE-2024-53229 CVE-2024-53230 CVE-2024-53231 CVE-2024-53232 CVE-2024-53233 CVE-2024-53234 CVE-2024-53236 CVE-2024-53237 CVE-2024-53239 CVE-2024-53240 CVE-2024-53241 CVE-2024-53685 CVE-2024-53690 CVE-2024-54680 CVE-2024-55639 CVE-2024-55881 CVE-2024-55916 CVE-2024-56369 CVE-2024-56372 CVE-2024-56531 CVE-2024-56532 CVE-2024-56533 CVE-2024-56536 CVE-2024-56538 CVE-2024-56539 CVE-2024-56543 CVE-2024-56546 CVE-2024-56548 CVE-2024-56549 CVE-2024-56551 CVE-2024-56557 CVE-2024-56558 CVE-2024-56562 CVE-2024-56566 CVE-2024-56567 CVE-2024-56568 CVE-2024-56569 CVE-2024-56570 CVE-2024-56571 CVE-2024-56572 CVE-2024-56573 CVE-2024-56574 CVE-2024-56575 CVE-2024-56576 CVE-2024-56577 CVE-2024-56578 CVE-2024-56582 CVE-2024-56584 CVE-2024-56587 CVE-2024-56588 CVE-2024-56589 CVE-2024-56590 CVE-2024-56593 CVE-2024-56594 CVE-2024-56595 CVE-2024-56596 CVE-2024-56597 CVE-2024-56598 CVE-2024-56599 CVE-2024-5660 CVE-2024-56602 CVE-2024-56603 CVE-2024-56604 CVE-2024-56605 CVE-2024-56606 CVE-2024-56607 CVE-2024-56609 CVE-2024-56611 CVE-2024-56614 CVE-2024-56615 CVE-2024-56616 CVE-2024-56617 CVE-2024-56619 CVE-2024-56620 CVE-2024-56622 CVE-2024-56623 CVE-2024-56625 CVE-2024-56629 CVE-2024-56630 CVE-2024-56631 CVE-2024-56632 CVE-2024-56634 CVE-2024-56635 CVE-2024-56636 CVE-2024-56637 CVE-2024-56641 CVE-2024-56642 CVE-2024-56643 CVE-2024-56644 CVE-2024-56645 CVE-2024-56648 CVE-2024-56649 CVE-2024-56651 CVE-2024-56654 CVE-2024-56656 CVE-2024-56659 CVE-2024-56660 CVE-2024-56661 CVE-2024-56662 CVE-2024-56663 CVE-2024-56664 CVE-2024-56667 CVE-2024-56670 CVE-2024-56672 CVE-2024-56675 CVE-2024-56677 CVE-2024-56678 CVE-2024-56681 CVE-2024-56683 CVE-2024-56687 CVE-2024-56688 CVE-2024-56690 CVE-2024-56691 CVE-2024-56694 CVE-2024-56698 CVE-2024-56700 CVE-2024-56701 CVE-2024-56704 CVE-2024-56705 CVE-2024-56708 CVE-2024-56709 CVE-2024-56712 CVE-2024-56716 CVE-2024-56722 CVE-2024-56723 CVE-2024-56724 CVE-2024-56729 CVE-2024-56739 CVE-2024-56741 CVE-2024-56745 CVE-2024-56746 CVE-2024-56747 CVE-2024-56748 CVE-2024-56752 CVE-2024-56754 CVE-2024-56755 CVE-2024-56756 CVE-2024-56759 CVE-2024-56760 CVE-2024-56765 CVE-2024-56766 CVE-2024-56767 CVE-2024-56769 CVE-2024-56774 CVE-2024-56775 CVE-2024-56776 CVE-2024-56777 CVE-2024-56778 CVE-2024-56779 CVE-2024-56780 CVE-2024-56787 CVE-2024-57791 CVE-2024-57792 CVE-2024-57793 CVE-2024-57795 CVE-2024-57798 CVE-2024-57801 CVE-2024-57804 CVE-2024-57809 CVE-2024-57838 CVE-2024-57849 CVE-2024-57850 CVE-2024-57857 CVE-2024-57874 CVE-2024-57876 CVE-2024-57887 CVE-2024-57888 CVE-2024-57890 CVE-2024-57892 CVE-2024-57893 CVE-2024-57896 CVE-2024-57897 CVE-2024-57899 CVE-2024-57903 CVE-2024-57904 CVE-2024-57906 CVE-2024-57907 CVE-2024-57908 CVE-2024-57910 CVE-2024-57911 CVE-2024-57912 CVE-2024-57913 CVE-2024-57915 CVE-2024-57916 CVE-2024-57922 CVE-2024-57926 CVE-2024-57929 CVE-2024-57932 CVE-2024-57933 CVE-2024-57935 CVE-2024-57936 CVE-2024-57940 CVE-2024-8805 CVE-2025-21632 CVE-2025-21645 CVE-2025-21646 CVE-2025-21649 CVE-2025-21650 CVE-2025-21651 CVE-2025-21656 CVE-2025-21662 |
CWE-ID | CWE-362 CWE-667 CWE-125 CWE-399 CWE-476 CWE-119 CWE-20 CWE-401 CWE-416 CWE-190 CWE-908 CWE-388 CWE-835 CWE-415 CWE-369 CWE-682 CWE-191 CWE-366 CWE-665 CWE-787 CWE-1037 CWE-254 CWE-617 CWE-284 |
Exploitation vector | Network |
Public exploit |
Vulnerability #95 is being exploited in the wild. Vulnerability #125 is being exploited in the wild. |
Vulnerable software |
Confidential Computing Module Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system kernel-source-coco Operating systems & Components / Operating system package or component kernel-devel-coco Operating systems & Components / Operating system package or component kernel-coco-vdso-debuginfo Operating systems & Components / Operating system package or component kernel-syms-coco Operating systems & Components / Operating system package or component reiserfs-kmp-coco-debuginfo Operating systems & Components / Operating system package or component reiserfs-kmp-coco Operating systems & Components / Operating system package or component kernel-coco_debug-debugsource Operating systems & Components / Operating system package or component kernel-coco_debug-debuginfo Operating systems & Components / Operating system package or component kernel-coco-debuginfo Operating systems & Components / Operating system package or component kernel-coco_debug-devel-debuginfo Operating systems & Components / Operating system package or component kernel-coco_debug-devel Operating systems & Components / Operating system package or component kernel-coco-debugsource Operating systems & Components / Operating system package or component kernel-coco-devel Operating systems & Components / Operating system package or component kernel-coco_debug Operating systems & Components / Operating system package or component kernel-coco Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 343 vulnerabilities.
EUVDB-ID: #VU89388
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52489
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the section_deactivate() function in mm/sparse.c. A local user can exploit the race and escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103086
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52923
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nft_rbtree_cmp(), __nft_rbtree_lookup(), nft_rbtree_get(), nft_rbtree_gc_elem(), nft_rbtree_activate(), nft_rbtree_flush() and nft_rbtree_gc() functions in net/netfilter/nft_set_rbtree.c, within the pipapo_drop(), pipapo_gc() and nft_pipapo_activate() functions in net/netfilter/nft_set_pipapo.c, within the nft_rhash_cmp(), nft_rhash_activate(), nft_rhash_flush(), nft_rhash_deactivate(), nft_rhash_gc() and nft_rhash_destroy() functions in net/netfilter/nft_set_hash.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90362
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26596
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the EXPORT_SYMBOL_GPL() and dsa_user_changeupper() functions in net/dsa/user.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89055
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26924
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources within the nft_pipapo_remove() function in net/netfilter/nft_set_pipapo.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92027
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27397
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __nft_rbtree_insert(), nft_rbtree_deactivate() and nft_rbtree_gc() functions in net/netfilter/nft_set_rbtree.c, within the pipapo_get(), nft_pipapo_get(), nft_pipapo_insert(), pipapo_gc() and pipapo_deactivate() functions in net/netfilter/nft_set_pipapo.c, within the nft_rhash_key(), nft_rhash_cmp(), nft_rhash_lookup(), nft_rhash_get(), nft_rhash_update(), nft_rhash_insert() and nft_rhash_deactivate() functions in net/netfilter/nft_set_hash.c, within the nft_trans_gc_catchall_sync() and nf_tables_valid_genid() functions in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93386
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35839
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nf_reject6_fill_skb_dst() and nf_send_reset6() functions in net/ipv6/netfilter/nf_reject_ipv6.c, within the nf_reject_fill_skb_dst() and nf_send_reset() functions in net/ipv4/netfilter/nf_reject_ipv4.c, within the br_nf_pre_routing_finish_ipv6() function in net/bridge/br_netfilter_ipv6.c, within the br_nf_pre_routing_finish_bridge(), br_nf_ipv4_daddr_was_changed(), bridge_parent_rtable(), skb_dst_set_noref(), setup_pre_routing(), br_nf_forward_finish(), ip_sabotage_in() and br_nf_pre_routing_finish_bridge_slow() functions in net/bridge/br_netfilter_hooks.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102920
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36476
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the send_io_resp_imm() function in drivers/infiniband/ulp/rtrs/rtrs-srv.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93278
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36908
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the iocg_pay_debt() function in block/blk-iocost.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90268
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36915
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the nfc_llcp_setsockopt() function in net/nfc/llcp_sock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102972
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39282
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the t7xx_fsm_broadcast_state(), fsm_main_thread() and t7xx_fsm_append_cmd() functions in drivers/net/wwan/t7xx/t7xx_state_monitor.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93827
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39480
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the kdb_printf() function in kernel/debug/kdb/kdb_io.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95003
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41042
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the nf_tables_rule_release(), nft_chain_validate(), nft_chain_validate_hooks() and nft_validate_register_store() functions in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96511
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43913
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the devm_apple_nvme_mempool_destroy() and apple_nvme_probe() functions in drivers/nvme/host/apple.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96517
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44934
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the br_multicast_del_port() function in net/bridge/br_multicast.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96879
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44996
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the __vsock_recvmsg() function in net/vmw_vsock/vsock_bpf.c, within the __vsock_dgram_recvmsg(), vsock_connectible_recvmsg() and release_sock() functions in net/vmw_vsock/af_vsock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102922
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45828
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the hci_dma_cleanup() function in drivers/i3c/master/mipi-i3c-hci/dma.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97270
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46680
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ps_wakeup(), btnxpuart_close() and nxp_serdev_remove() functions in drivers/bluetooth/btnxpuart.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97522
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46765
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ice_xsk_pool_setup() function in drivers/net/ethernet/intel/ice/ice_xsk.c, within the ice_clear_hw_tbls(), ice_xdp_setup_prog() and ice_xdp() functions in drivers/net/ethernet/intel/ice/ice_main.c, within the ice_vsi_free(), ice_vsi_alloc() and ice_vsi_rebuild() functions in drivers/net/ethernet/intel/ice/ice_lib.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97501
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46800
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the qdisc_enqueue() function in net/sched/sch_netem.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102923
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46896
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the amdgpu_job_set_resources() and amdgpu_job_free_resources() functions in drivers/gpu/drm/amd/amdgpu/amdgpu_job.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102924
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47141
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the pr_fmt(), pinmux_can_be_used_for_gpio(), pin_request(), pin_free(), pinmux_enable_setting(), pinmux_disable_setting() and pinmux_pins_show() functions in drivers/pinctrl/pinmux.c, within the pinctrl_register_one_pin() function in drivers/pinctrl/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102949
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47143
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the check_unmap() function in kernel/dma/debug.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99030
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47678
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the icmpv6_mask_allow(), icmpv6_global_allow(), icmpv6_xrlim_allow(), icmp6_send() and icmpv6_echo_reply() functions in net/ipv6/icmp.c, within the __SPIN_LOCK_UNLOCKED(), icmpv4_mask_allow(), icmpv4_global_allow(), icmpv4_xrlim_allow(), icmp_reply() and __icmp_send() functions in net/ipv4/icmp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102925
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47809
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the validate_lock_args() function in fs/dlm/lock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102926
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-48873
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the rtw89_update_6ghz_rnr_chan() function in drivers/net/wireless/realtek/rtw89/fw.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102927
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-48881
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cache_set_flush() function in drivers/md/bcache/super.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102946
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49569
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nvme_stop_keep_alive() function in drivers/nvme/host/rdma.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98892
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49854
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the bfq_prepare_request() and bfq_init_rq() functions in block/bfq-iosched.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98867
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49884
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ext4_split_extent_at() and ext4_ext_dirty() functions in fs/ext4/extents.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98932
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49915
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn32_init_hw() function in drivers/gpu/drm/amd/display/dc/hwss/dcn32/dcn32_hwseq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98953
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49944
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the sctp_listen_start() function in net/sctp/socket.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99171
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49951
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the cmd_status_rsp(), mgmt_index_added(), mgmt_power_on() and __mgmt_power_off() functions in net/bluetooth/mgmt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99151
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49952
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the nf_dup_ipv6_route() and nf_dup_ipv6() functions in net/ipv6/netfilter/nf_dup_ipv6.c, within the nf_dup_ipv4() function in net/ipv4/netfilter/nf_dup_ipv4.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98944
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49998
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the EXPORT_SYMBOL_GPL() and dsa_switch_shutdown() functions in net/dsa/dsa.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99090
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50016
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the dp_set_test_pattern() function in drivers/gpu/drm/amd/display/dc/link/accessories/link_dp_cts.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99091
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50018
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the NETDEVICE_SHOW_RW() and napi_defer_hard_irqs_store() functions in net/core/net-sysfs.c, within the netif_elide_gro() function in Documentation/networking/net_cachelines/net_device.rst. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99133
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50039
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the qdisc_skb_cb() function in net/sched/sch_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98995
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50047
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the SMB2_negotiate() function in fs/smb/client/smb2pdu.c, within the smb2_get_enc_key(), crypt_message(), smb3_init_transform_rq() and decrypt_raw_data() functions in fs/smb/client/smb2ops.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102917
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50051
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the mpc52xx_spi_remove() function in drivers/spi/spi-mpc52xx.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99802
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50106
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the destroy_delegation(), nfsd4_revoke_states(), nfs4_laundromat(), nfsd4_free_stateid() and nfsd4_delegreturn() functions in fs/nfsd/nfs4state.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100084
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50143
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the udf_current_aext() function in fs/udf/inode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100066
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50151
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the SMB2_ioctl_init() function in fs/cifs/smb2pdu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100062
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50154
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the reqsk_queue_unlink() and reqsk_timer_handler() functions in net/ipv4/inet_connection_sock.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100120
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50199
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the unuse_mm() function in mm/swapfile.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100130
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50202
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the nilfs_lookup(), nilfs_do_unlink(), nilfs_rename() and nilfs_get_parent() functions in fs/nilfs2/namei.c, within the nilfs_readdir(), nilfs_find_entry() and nilfs_inode_by_name() functions in fs/nilfs2/dir.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100139
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50203
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the prepare_trampoline() function in arch/arm64/net/bpf_jit_comp.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100134
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50211
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the udf_truncate_extents() function in fs/udf/truncate.c, within the udf_try_read_meta() function in fs/udf/partition.c, within the udf_map_block(), udf_extend_file(), udf_delete_aext() and inode_bmap() functions in fs/udf/inode.c, within the udf_fiiter_init() and udf_fiiter_append_blk() functions in fs/udf/directory.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100182
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50228
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the shmem_getattr() function in mm/shmem.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100163
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50252
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the mlxsw_sp_ipip_ol_netdev_change_gre6() function in drivers/net/ethernet/mellanox/mlxsw/spectrum_ipip.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100192
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50256
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the nf_reject6_fill_skb_dst() and nf_send_reset6() functions in net/ipv6/netfilter/nf_reject_ipv6.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100173
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50262
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the trie_get_next_key() function in kernel/bpf/lpm_trie.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100640
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50272
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the filemap_read() function in mm/filemap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100619
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50278
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the get_cache_dev_size() and cache_preresume() functions in drivers/md/dm-cache-target.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100620
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50279
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the can_resize() function in drivers/md/dm-cache-target.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100614
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50280
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the check_migrations(), destroy(), cache_create() and cache_ctr() functions in drivers/md/dm-cache-target.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100626
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50296
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the hnae3_unregister_ae_algo_prepare() function in drivers/net/ethernet/hisilicon/hns3/hnae3.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100631
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50299
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the sctp_sf_ootb() function in net/sctp/sm_statefuns.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102974
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-52332
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the igb_init_module() function in drivers/net/ethernet/intel/igb/igb_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100747
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53043
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the mctp_i2c_header_create() function in drivers/net/mctp/mctp-i2c.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100709
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53050
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the intel_dp_hdcp2_get_capability() function in drivers/gpu/drm/i915/display/intel_dp_hdcp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100710
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53051
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the intel_hdcp_read_valid_bksv() function in drivers/gpu/drm/i915/display/intel_hdcp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100734
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53055
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the iwl_mvm_umac_scan_cfg_channels_v6_6g() function in drivers/net/wireless/intel/iwlwifi/mvm/scan.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100711
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53056
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mtk_crtc_destroy() function in drivers/gpu/drm/mediatek/mtk_crtc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100714
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53064
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the idpf_init_hard_reset() function in drivers/net/ethernet/intel/idpf/idpf_lib.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100833
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53090
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the afs_deferred_free_worker(), afs_alloc_call(), afs_put_call(), afs_wake_up_call_waiter() and afs_wake_up_async_call() functions in fs/afs/rxrpc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100836
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53091
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the include/net/tls.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100830
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53095
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the clean_demultiplex_info(), cifs_put_tcp_session() and generic_ip_connect() functions in fs/smb/client/connect.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100938
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53099
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the bpf_link_show_fdinfo() function in kernel/bpf/syscall.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101106
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53103
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the hvs_destruct() function in net/vmw_vsock/hyperv_transport.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101108
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53105
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the __page_cache_release() function in mm/swap.c, within the free_pages_prepare() function in mm/page_alloc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101116
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53110
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the vp_vdpa_probe() function in drivers/vdpa/virtio_pci/vp_vdpa.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101110
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53111
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the mm/mremap.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101103
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53113
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the alloc_pages_bulk_noprof() function in mm/page_alloc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101096
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53117
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the virtio_transport_send_pkt_info() function in net/vmw_vsock/virtio_transport_common.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101097
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53118
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the vsock_sk_destruct() function in net/vmw_vsock/af_vsock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101098
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53119
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the virtio_transport_recv_listen() function in net/vmw_vsock/virtio_transport_common.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101105
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53120
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mlx5_tc_ct_entry_add_rule() function in drivers/net/ethernet/mellanox/mlx5/core/en/tc_ct.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101099
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53121
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the lookup_fte_locked() function in drivers/net/ethernet/mellanox/mlx5/core/fs_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101111
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53122
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the mptcp_rcv_space_adjust() function in net/mptcp/protocol.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101233
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53125
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the find_equal_scalars() function in kernel/bpf/verifier.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101235
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53126
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the psnet_open_pf_bar() function in drivers/vdpa/solidrun/snet_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101231
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53127
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the dw_mci_init_slot() function in drivers/mmc/host/dw_mmc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101224
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53129
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the vop_plane_atomic_async_check() function in drivers/gpu/drm/rockchip/rockchip_drm_vop.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101225
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53130
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the nilfs_grab_buffer() function in fs/nilfs2/page.c, within the nilfs_mdt_create_block() function in fs/nilfs2/mdt.c, within the nilfs_gccache_submit_read_data() function in fs/nilfs2/gcinode.c, within the nilfs_btnode_create_block() and nilfs_btnode_submit_block() functions in fs/nilfs2/btnode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101226
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53131
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __nilfs_get_page_block() function in fs/nilfs2/page.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101222
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53133
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the dc_state_create_copy() function in drivers/gpu/drm/amd/display/dc/core/dc_state.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101236
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53134
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the imx93_blk_ctrl_remove() function in drivers/pmdomain/imx/imx93-blk-ctrl.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101229
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53136
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the shmem_getattr() function in mm/shmem.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101234
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53138
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the tx_sync_info_get(), mlx5e_ktls_tx_handle_resync_dump_comp() and mlx5e_ktls_tx_handle_ooo() functions in drivers/net/ethernet/mellanox/mlx5/core/en_accel/ktls_tx.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101348
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53141
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the bitmap_ip_uadt() function in net/netfilter/ipset/ip_set_bitmap_ip.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101347
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53142
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the do_name() and do_copy() functions in init/initramfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101815
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53144
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the hci_user_confirm_request_evt() function in net/bluetooth/hci_event.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101921
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53146
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the decode_cb_compound4res() function in fs/nfsd/nfs4callback.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101927
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53148
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the comedi_mmap() function in drivers/comedi/comedi_fops.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101910
Risk: High
CVSSv4.0: 6.8 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber]
CVE-ID: CVE-2024-53150
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the DESC_LENGTH_CHECK(), validate_clock_source() and validate_clock_selector() functions in sound/usb/clock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU101922
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53151
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the xdr_check_write_chunk() function in net/sunrpc/xprtrdma/svc_rdma_recvfrom.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101913
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53154
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the applnco_probe() function in drivers/clk/clk-apple-nco.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101917
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53155
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the ocfs2_file_write_iter() and ocfs2_file_read_iter() functions in fs/ocfs2/file.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101911
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53156
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the htc_connect_service() function in drivers/net/wireless/ath/ath9k/htc_hst.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101914
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53157
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the scpi_dvfs_get_info() function in drivers/firmware/arm_scpi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101924
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53158
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the geni_se_clk_tbl_get() function in drivers/soc/qcom/qcom-geni-se.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101925
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53159
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the store_target_temp(), store_temp_tolerance() and store_weight_temp() functions in drivers/hwmon/nct6775-core.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101926
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53160
CWE-ID:
CWE-366 - Race Condition within a Thread
Exploit availability: No
DescriptionThe vulnerability allows a local user to corrupt data.
The vulnerability exists due to a data race within the krc_count(), schedule_delayed_monitor_work() and kvfree_call_rcu() functions in kernel/rcu/tree.c. A local user can corrupt data.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101923
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53161
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the bluefield_edac_check() function in drivers/edac/bluefield_edac.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101912
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53162
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the uof_get_name() function in drivers/crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102248
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53164
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the choke_drop_by_idx() function in net/sched/sch_choke.c, within the cake_drop() function in net/sched/sch_cake.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102048
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53166
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the bfq_choose_req(), bfqq_request_over_limit() and bfq_limit_depth() functions in block/bfq-iosched.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102061
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53168
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the xs_create_sock() function in net/sunrpc/xprtsock.c, within the svc_create_socket() function in net/sunrpc/svcsock.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102220
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53169
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the EXPORT_SYMBOL_GPL() function in drivers/nvme/host/core.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102060
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53170
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the del_gendisk() function in block/genhd.c, within the blk_register_queue() function in block/blk-sysfs.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102059
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53171
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the get_znodes_to_commit() function in fs/ubifs/tnc_commit.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102249
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53172
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the alloc_ai(), scan_fast() and ubi_attach() functions in drivers/mtd/ubi/attach.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102058
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53173
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nfs4_open_release() function in fs/nfs/nfs4proc.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102057
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53174
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the c_show() function in net/sunrpc/cache.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102000
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53175
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the create_ipc_ns() function in ipc/namespace.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102054
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53179
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the smb2_get_sign_key(), smb2_find_smb_ses_unlocked(), smb2_calc_signature() and smb3_calc_signature() functions in fs/smb/client/smb2transport.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102222
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53180
CWE-ID:
CWE-665 - Improper Initialization
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper initialization within the snd_pcm_mmap_data_fault() function in sound/core/pcm_native.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102051
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53185
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the SMB2_negotiate() function in fs/smb/client/smb2pdu.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102130
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53188
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ath12k_dp_cc_cleanup() function in drivers/net/wireless/ath/ath12k/dp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102173
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53190
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the efuse_write_1byte() and read_efuse_byte() functions in drivers/net/wireless/realtek/rtlwifi/efuse.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102194
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53191
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the ath12k_dp_free() function in drivers/net/wireless/ath/ath12k/dp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102049
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53194
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the pci_slot_release(), pci_bus_get() and make_slot_name() functions in drivers/pci/slot.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102232
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53195
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the DECLARE_KVM_NVHE_PER_CPU(), kvm_arch_vcpu_postcreate(), kvm_arch_vcpu_run_pid_change(), kvm_vcpu_exit_request() and kvm_arch_vcpu_ioctl_run() functions in arch/arm64/kvm/arm.c, within the get_timer_map() function in arch/arm64/kvm/arch_timer.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102209
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53196
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the kvm_mmio_read_buf() and kvm_handle_mmio_return() functions in arch/arm64/kvm/mmio.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102090
Risk: High
CVSSv4.0: 8.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber]
CVE-ID: CVE-2024-53197
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a local user to compromise the affected system.
The vulnerability exists due to an out-of-bounds write error within the snd_usb_create_quirk(), snd_usb_extigy_boot_quirk(), mbox2_setup_48_24_magic() and snd_usb_mbox2_boot_quirk() functions in sound/usb/quirks.c. A local user can trigger an out-of-bounds write and execute arbitrary code on the system.
Note, the vulnerability is being actively exploited against Android devices.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU102006
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53198
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the xenbus_dev_probe() function in drivers/xen/xenbus/xenbus_probe.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102138
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53200
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the hwss_setup_dpp() function in drivers/gpu/drm/amd/display/dc/core/dc_hw_sequencer.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102137
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53201
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn20_program_pipe() function in drivers/gpu/drm/amd/display/dc/hwss/dcn20/dcn20_hwseq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102005
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53202
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the fw_log_firmware_info() function in drivers/base/firmware_loader/main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102046
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53206
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __inet_csk_reqsk_queue_drop() function in net/ipv4/inet_connection_sock.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102176
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53207
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the mgmt_set_discoverable_complete(), mgmt_set_connectable_complete(), set_ssp_complete(), set_name_complete(), set_default_phy_complete(), start_discovery_complete(), stop_discovery_complete() and read_local_oob_ext_data_complete() functions in net/bluetooth/mgmt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102063
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53208
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the mgmt_set_powered_complete() function in net/bluetooth/mgmt.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102134
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53209
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the bnxt_set_rx_skb_mode() and bnxt_change_mtu() functions in drivers/net/ethernet/broadcom/bnxt/bnxt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102004
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53210
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the iucv_sock_recvmsg() function in net/iucv/af_iucv.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102195
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53213
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the lan78xx_probe() function in drivers/net/usb/lan78xx.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102092
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53214
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the vfio_virt_config_read() and vfio_config_do_rw() functions in drivers/vfio/pci/vfio_pci_config.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102208
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53215
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the svc_rdma_proc_init() function in net/sunrpc/xprtrdma/svc_rdma.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102356
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53216
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in fs/nfsd/export.c. A local user can execute arbitrary code with elevated privileges.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102133
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53217
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the nfsd4_process_cb_update() function in fs/nfsd/nfs4callback.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102129
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53222
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the zram_add() function in drivers/block/zram/zram_drv.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102141
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53224
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mlx5_ib_dev_res_init(), mlx5_ib_stage_delay_drop_cleanup(), mlx5_ib_stage_dev_notifier_init() and STAGE_CREATE() functions in drivers/infiniband/hw/mlx5/main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102067
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53227
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the bfad_init() function in drivers/scsi/bfa/bfad.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102217
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53229
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the rxe_requester() function in drivers/infiniband/sw/rxe/rxe_req.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102143
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53230
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cppc_get_cpu_cost() function in drivers/cpufreq/cppc_cpufreq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102144
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53231
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cppc_get_cpu_power() function in drivers/cpufreq/cppc_cpufreq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102068
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53232
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the calc_rtx(), s390_domain_free(), s390_iommu_attach_device(), s390_iommu_probe_device(), s390_iommu_unmap_pages() and s390_iommu_init() functions in drivers/iommu/s390-iommu.c, within the pci_fmb_show() function in arch/s390/pci/pci_debug.c, within the zpci_fmb_enable_device() function in arch/s390/pci/pci.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102207
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53233
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the utf8_load() function in fs/unicode/utf8-core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102251
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53234
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the z_erofs_load_compact_lcluster() and z_erofs_get_extent_decompressedlen() functions in fs/erofs/zmap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102003
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53236
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the xsk_build_skb() function in net/xdp/xsk.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102069
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53237
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __match_tty() and hci_conn_del_sysfs() functions in net/bluetooth/hci_sysfs.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102070
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53239
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the usb6fire_chip_abort(), usb6fire_chip_destroy(), usb6fire_chip_probe() and usb6fire_chip_disconnect() functions in sound/usb/6fire/chip.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101818
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-53240
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote backend to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the guest xen-netfront driver. A a malicious network backend can crash the guest OS.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101817
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53241
CWE-ID:
CWE-1037 - Processor optimization removal or modification of security-critical code
Exploit availability: No
DescriptionThe vulnerability allows a malicious guest to gain access to sensitive information.
The vulnerability exists due to implemented mitigations for hardware vulnerabilities related to Xen hypercall page implementation the guest OS is relying on to work might not be fully functional, resulting in e.g. guest user processes being able to read data they ought not have access to.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102945
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53685
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the fs/ceph/mds_client.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102965
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53690
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the nilfs_lookup() function in fs/nilfs2/namei.c, within the nilfs_iget() function in fs/nilfs2/inode.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102916
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-54680
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a use-after-free error within the clean_demultiplex_info(), cifs_get_tcp_session(), cifs_crypto_secmech_release(), cifs_put_tcp_session() and generic_ip_connect() functions in fs/smb/client/connect.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102991
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-55639
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the rswitch_device_alloc(), of_node_put() and rswitch_device_free() functions in drivers/net/ethernet/renesas/rswitch.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102984
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-55881
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the complete_hypercall_exit() function in arch/x86/kvm/x86.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102929
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-55916
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the util_probe() function in drivers/hv/hv_util.c, within the hv_vss_init() function in drivers/hv/hv_snapshot.c, within the hv_kvp_init() function in drivers/hv/hv_kvp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102970
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56369
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the EXPORT_SYMBOL() and drm_mode_vrefresh() functions in drivers/gpu/drm/drm_modes.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102959
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56372
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the tun_napi_alloc_frags() function in drivers/net/tun.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102180
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56531
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the snd_usb_caiaq_input_free() function in sound/usb/caiaq/input.c, within the setup_card(), init_card() and snd_disconnect() functions in sound/usb/caiaq/device.c, within the snd_usb_caiaq_audio_init() function in sound/usb/caiaq/audio.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102181
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56532
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the snd_us122l_disconnect() function in sound/usb/usx2y/us122l.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102182
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56533
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the snd_usx2y_disconnect() function in sound/usb/usx2y/usbusx2y.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102148
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56536
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cw1200_spi_suspend() function in drivers/net/wireless/st/cw1200/cw1200_spi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102071
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56538
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the zynqmp_dpsub_drm_cleanup() function in drivers/gpu/drm/xlnx/zynqmp_kms.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102236
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56539
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the drivers/net/wireless/marvell/mwifiex/fw.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102252
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56543
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ath12k_mac_peer_cleanup_all() function in drivers/net/wireless/ath/ath12k/mac.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102074
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56546
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the xlnx_add_cb_for_suspend() function in drivers/soc/xilinx/xlnx_event_manager.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102075
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56548
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the hfsplus_read_wrapper() function in fs/hfsplus/wrapper.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102151
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56549
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cachefiles_ondemand_fd_write_iter() and cachefiles_ondemand_fd_llseek() functions in fs/cachefiles/ondemand.c, within the cachefiles_commit_object() and cachefiles_clean_up_object() functions in fs/cachefiles/interface.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102039
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56551
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the amdgpu_vce_sw_fini() function in drivers/gpu/drm/amd/amdgpu/amdgpu_vce.c, within the amdgpu_device_fini_sw() function in drivers/gpu/drm/amd/amdgpu/amdgpu_device.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102213
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56557
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the __aligned() function in drivers/iio/adc/ad7923.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102042
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56558
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the e_show() function in fs/nfsd/export.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102279
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56562
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the i3c_master_put_i3c_addrs() function in drivers/i3c/master.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102170
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56566
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the check_slab(), slab_fix() and alloc_single_from_partial() functions in mm/slub.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102216
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56567
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the ad7780_write_raw() function in drivers/iio/adc/ad7780.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102127
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56568
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the arm_smmu_probe_device() function in drivers/iommu/arm/arm-smmu/arm-smmu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102126
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56569
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ftrace_mod_callback() function in kernel/trace/ftrace.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102280
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56570
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ovl_dentry_init_flags() function in fs/overlayfs/util.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102230
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56571
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the uvc_alloc_entity(), uvc_parse_vendor_control(), uvc_parse_standard_control() and uvc_gpio_parse() functions in drivers/media/usb/uvc/uvc_driver.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101996
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56572
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the allocate_buffers_internal() function in drivers/media/platform/allegro-dvt/allegro-core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102193
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56573
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the efi_handle_cmdline() function in drivers/firmware/efi/libstub/efi-stub.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102125
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56574
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ts2020_regmap_unlock() function in drivers/media/dvb-frontends/ts2020.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102124
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56575
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mxc_jpeg_detach_pm_domains() function in drivers/media/platform/nxp/imx-jpeg/mxc-jpeg.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102229
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56576
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the tc358743_probe() function in drivers/media/i2c/tc358743.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102123
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56577
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mtk_jpegdec_hw_init_irq() and mtk_jpegdec_hw_probe() functions in drivers/media/platform/mediatek/jpeg/mtk_jpeg_dec_hw.c, within the mtk_jpeg_single_core_init() and mtk_jpeg_probe() functions in drivers/media/platform/mediatek/jpeg/mtk_jpeg_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102206
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56578
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the mxc_jpeg_probe() function in drivers/media/platform/nxp/imx-jpeg/mxc-jpeg.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102045
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56582
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the btrfs_encoded_read_endio() function in fs/btrfs/inode.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102038
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56584
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the io_init_wq_offload() function in io_uring/tctx.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102104
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56587
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the brightness_show() and max_brightness_show() functions in drivers/leds/led-class.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102106
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56588
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the debugfs_to_reg_name_v3_hw(), debugfs_global_v3_hw_show(), debugfs_axi_v3_hw_show(), debugfs_ras_v3_hw_show(), debugfs_port_v3_hw_show(), debugfs_cq_v3_hw_show(), debugfs_dq_show_slot_v3_hw(), debugfs_iost_v3_hw_show(), debugfs_iost_cache_v3_hw_show(), debugfs_itct_v3_hw_show(), debugfs_itct_cache_v3_hw_show(), debugfs_create_files_v3_hw(), debugfs_release_v3_hw(), debugfs_snapshot_regs_v3_hw(), debugfs_bist_init_v3_hw() and debugfs_init_v3_hw() functions in drivers/scsi/hisi_sas/hisi_sas_v3_hw.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102168
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56589
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the cq_thread_v3_hw() function in drivers/scsi/hisi_sas/hisi_sas_v3_hw.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102281
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56590
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the hci_tx_work() and hci_acldata_packet() functions in net/bluetooth/hci_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102107
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56593
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the brcmf_sdiod_sgtable_alloc() function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/bcmsdh.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102160
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56594
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the amdgpu_ttm_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_ttm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102088
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56595
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the dbAdjTree() function in fs/jfs/jfs_dmap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102087
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56596
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the jfs_readdir() function in fs/jfs/jfs_dtree.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102086
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56597
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the dbAllocCtl() function in fs/jfs/jfs_dmap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102085
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56598
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the dtReadFirst() function in fs/jfs/jfs_dtree.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102108
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56599
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ath10k_sdio_remove() function in drivers/net/wireless/ath/ath10k/sdio.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103509
Risk: High
CVSSv4.0: 6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:H/E:U/U:Amber]
CVE-ID: CVE-2024-5660
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a malicious guest to compromise the hypervisor.
The vulnerability exists due to incorrect memory address translation when Hardware Page Aggregation (HPA) is enabled and Stage-1 and/or Stage-2 translation is enabled for the active translation regime. A malicious guest can bypass Stage-2 translation and/or GPT protection and compromise the host in certain hypervisor environments.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102017
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56602
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ieee802154_create() function in net/ieee802154/socket.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102018
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56603
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the can_create() function in net/can/af_can.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102019
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56604
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the rfcomm_sock_alloc() function in net/bluetooth/rfcomm/sock.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102020
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56605
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the l2cap_sock_alloc() function in net/bluetooth/l2cap_sock.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102021
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56606
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the packet_create() function in net/packet/af_packet.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102166
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56607
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ath12k_mac_op_set_bitrate_mask() function in drivers/net/wireless/ath/ath12k/mac.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102165
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56609
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the rtw_usb_tx_handler() and rtw_usb_deinit_tx() functions in drivers/net/wireless/realtek/rtw88/usb.c, within the rtw_sdio_deinit_tx() function in drivers/net/wireless/realtek/rtw88/sdio.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102109
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56611
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the migrate_to_node() function in mm/mempolicy.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102084
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56614
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the xsk_map_delete_elem() function in net/xdp/xskmap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102083
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56615
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the dev_map_alloc(), dev_map_delete_elem() and dev_map_hash_delete_elem() functions in kernel/bpf/devmap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102082
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56616
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the drm_dp_decode_sideband_msg_hdr() function in drivers/gpu/drm/display/drm_dp_mst_topology.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102111
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56617
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the last_level_cache_is_valid(), populate_cache_leaves() and init_level_allocate_ci() functions in drivers/base/cacheinfo.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102022
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56619
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nilfs_put_page() function in fs/nilfs2/dir.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102112
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56620
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ufs_qcom_probe() function in drivers/ufs/host/ufs-qcom.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102283
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56622
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the read_req_latency_avg_show() and write_req_latency_avg_show() functions in drivers/ufs/core/ufs-sysfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102023
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56623
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the qla2x00_do_dpc() function in drivers/scsi/qla2xxx/qla_os.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102244
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56625
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the can_set_termination() function in drivers/net/can/dev/dev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102114
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56629
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the wacom_update_name() function in drivers/hid/wacom_sys.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102203
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56630
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the ocfs2_get_init_inode() function in fs/ocfs2/namei.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102024
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56631
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the sg_release() function in drivers/scsi/sg.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101993
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56632
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the nvme_stop_keep_alive() function in drivers/nvme/host/tcp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102115
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56634
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the grgpio_probe() function in drivers/gpio/gpio-grgpio.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102026
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56635
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the default_operstate() function in net/core/link_watch.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102245
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56636
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the geneve_xmit_skb() function in drivers/net/geneve.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102219
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56637
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the find_set_type() function in net/netfilter/ipset/ip_set_core.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102228
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56641
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the smc_sk_init(), smc_connect_rdma(), smc_connect_ism() and smc_listen_work() functions in net/smc/af_smc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102029
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56642
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cleanup_bearer() function in net/tipc/udp_media.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101989
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56643
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the dccp_feat_change_recv() function in net/dccp/feat.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101992
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56644
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ip6_negative_advice() function in net/ipv6/route.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102210
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56645
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the j1939_session_new() function in net/can/j1939/transport.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102079
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56648
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the fill_frame_info() function in net/hsr/hsr_forward.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102117
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56649
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the EXPORT_SYMBOL_GPL() function in drivers/net/ethernet/freescale/enetc/enetc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102030
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56651
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the hi3110_can_ist() function in drivers/net/can/spi/hi311x.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102257
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56654
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the hci_le_create_big_complete_evt() function in net/bluetooth/hci_event.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102202
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56656
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the drivers/net/ethernet/broadcom/bnxt/bnxt.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102201
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56659
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the include/net/lapb.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102118
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56660
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dr_domain_add_vport_cap() function in drivers/net/ethernet/mellanox/mlx5/core/steering/sws/dr_domain.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102119
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56661
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cleanup_bearer() function in net/tipc/udp_media.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102077
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56662
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the acpi_nfit_ctl() function in drivers/acpi/nfit/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102187
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56663
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the NLA_POLICY_NESTED_ARRAY() function in net/wireless/nl80211.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102034
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56664
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the sock_map_lookup_sys() function in net/core/sock_map.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102121
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56667
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the capture_engine() function in drivers/gpu/drm/i915/i915_gpu_error.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102122
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56670
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the gs_start_io() function in drivers/usb/gadget/function/u_serial.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102035
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56672
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the blkcg_unpin_online() function in block/blk-cgroup.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102036
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56675
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the perf_event_detach_bpf_prog() function in kernel/trace/bpf_trace.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102010
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56677
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the setup_arch() function in arch/powerpc/kernel/setup-common.c, within the fadump_cma_init() and fadump_reserve_mem() functions in arch/powerpc/kernel/fadump.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102012
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56678
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ___do_page_fault() function in arch/powerpc/mm/fault.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102198
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56681
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the ahash_hmac_setkey() and ahash_hmac_init() functions in drivers/crypto/bcm/cipher.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102276
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56683
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the vc4_hdmi_debugfs_regs() function in drivers/gpu/drm/vc4/vc4_hdmi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102156
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56687
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the musb_free_request() function in drivers/usb/musb/musb_gadget.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102096
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56688
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the xs_sock_reset_state_flags() function in net/sunrpc/xprtsock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102261
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56690
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the pcrypt_aead_encrypt() and pcrypt_aead_decrypt() functions in crypto/pcrypt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102226
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56691
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the wcove_typec_probe() function in drivers/usb/typec/tcpm/wcove.c, within the ARRAY_SIZE(), bxtwc_add_chained_irq_chip() and bxtwc_probe() functions in drivers/mfd/intel_soc_pmic_bxtwc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102157
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56694
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the sk_psock_strp_data_ready() function in net/core/skmsg.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102101
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56698
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dwc3_prepare_trbs_sg() function in drivers/usb/dwc3/gadget.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102102
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56700
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the fmc_send_cmd() function in drivers/media/radio/wl128x/fmdrv_common.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102158
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56701
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the dtl_worker_enable() and dtl_worker_disable() functions in arch/powerpc/platforms/pseries/lpar.c, within the dtl_enable() and dtl_disable() functions in arch/powerpc/platforms/pseries/dtl.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102192
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56704
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the xen_9pfs_front_free() function in net/9p/trans_xen.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102190
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56705
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to reachable assertion within the ia_css_3a_statistics_allocate() function in drivers/staging/media/atomisp/pci/sh_css_params.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102237
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56708
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the igen6_register_mci() and igen6_unregister_mcis() functions in drivers/edac/igen6_edac.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102155
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56709
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the io_queue_iowq() function in io_uring/io_uring.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101987
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56712
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the check_memfd_seals(), export_udmabuf() and udmabuf_create() functions in drivers/dma-buf/udmabuf.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102256
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56716
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the nsim_dev_health_break_write() function in drivers/net/netdevsim/health.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102268
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56722
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the free_srqc() function in drivers/infiniband/hw/hns/hns_roce_srq.c, within the hns_roce_mr_free() function in drivers/infiniband/hw/hns/hns_roce_mr.c, within the set_rwqe_data_seg(), free_mr_modify_rsv_qp(), free_mr_post_send_lp_wqe(), free_mr_send_cmd_to_hw(), hns_roce_v2_set_abs_fields(), hns_roce_v2_modify_qp(), hns_roce_v2_query_qp(), hns_roce_v2_destroy_qp_common(), hns_roce_v2_destroy_qp(), hns_roce_v2_modify_cq() and hns_roce_v2_query_cqc() functions in drivers/infiniband/hw/hns/hns_roce_hw_v2.c, within the hns_roce_table_put() function in drivers/infiniband/hw/hns/hns_roce_hem.c, within the free_cqc() function in drivers/infiniband/hw/hns/hns_roce_cq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102225
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56723
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ARRAY_SIZE() and bxtwc_probe() functions in drivers/mfd/intel_soc_pmic_bxtwc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102224
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56724
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the bxt_wcove_tmu_irq_handler() and bxt_wcove_tmu_probe() functions in drivers/platform/x86/intel/bxtwc_tmu.c, within the ARRAY_SIZE() and bxtwc_probe() functions in drivers/mfd/intel_soc_pmic_bxtwc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101985
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56729
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the spin_lock() function in fs/smb/client/cached_dir.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102154
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56739
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the rtc_timer_do_work() function in drivers/rtc/interface.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101984
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56741
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the policy_unpack_test_unpack_strdup_with_null_name(), policy_unpack_test_unpack_strdup_with_name() and policy_unpack_test_unpack_strdup_out_of_bounds() functions in security/apparmor/policy_unpack_test.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101982
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56745
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the reset_method_store() function in drivers/pci/pci.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101981
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56746
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the sh7760fb_alloc_mem() function in drivers/video/fbdev/sh7760fb.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101980
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56747
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the qedi_alloc_and_init_sb() function in drivers/scsi/qedi/qedi_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101979
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56748
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the qedf_alloc_and_init_sb() function in drivers/scsi/qedf/qedf_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102241
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56752
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the gf100_gr_chan_new() function in drivers/gpu/drm/nouveau/nvkm/engine/gr/gf100.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102273
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56754
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the caam_qi_init() function in drivers/crypto/caam/qi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102265
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56755
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the fs/netfs/fscache_volume.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102008
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56756
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nvme_free_host_mem(), __nvme_alloc_host_mem() and kfree() functions in drivers/nvme/host/pci.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102393
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56759
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the btrfs_force_cow_block() and btrfs_cow_block() functions in fs/btrfs/ctree.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102403
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56760
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the __pci_enable_msi_range() function in drivers/pci/msi/msi.c, within the pci_msi_domain_supports() function in drivers/pci/msi/irqdomain.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102396
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56765
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the vas_mmap_fault() function in arch/powerpc/platforms/book3s/vas-api.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102400
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56766
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the atmel_pmecc_create_user() function in drivers/mtd/nand/raw/atmel/pmecc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102397
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56767
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the at_xdmac_prep_dma_memset() function in drivers/dma/at_xdmac.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102401
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56769
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the MODULE_PARM_DESC() function in drivers/media/dvb-frontends/dib3000mb.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102483
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56774
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the btrfs_search_slot() function in fs/btrfs/ctree.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102476
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56775
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the restore_planes_and_stream_state() function in drivers/gpu/drm/amd/display/dc/core/dc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102484
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56776
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the sti_cursor_atomic_check() function in drivers/gpu/drm/sti/sti_cursor.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102485
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56777
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the sti_gdp_atomic_check() function in drivers/gpu/drm/sti/sti_gdp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102486
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56778
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the sti_hqvdp_atomic_check() function in drivers/gpu/drm/sti/sti_hqvdp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102477
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56779
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the release_open_stateid(), spin_lock() and nfsd4_process_open2() functions in fs/nfsd/nfs4state.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102489
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56780
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the dquot_writeback_dquots() function in fs/quota/dquot.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102495
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56787
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the imx8mq_soc_revision_from_atf(), imx8mq_soc_revision(), imx8mm_soc_uid(), kasprintf(), imx8_soc_init() and kfree() functions in drivers/soc/imx/soc-imx8m.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102990
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57791
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the smc_clc_wait_msg() function in net/smc/smc_clc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102978
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57792
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the set_charge_current_limit() function in drivers/power/supply/gpio-charger.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102902
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57793
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the alloc_quote_buf() function in drivers/virt/coco/tdx-guest/tdx-guest.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102906
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57795
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the rxe_query_port(), rxe_enable_driver(), INIT_RDMA_OBJ_SIZE() and rxe_register_device() functions in drivers/infiniband/sw/rxe/rxe_verbs.c, within the rxe_parent_name(), rxe_net_add() and rxe_port_down() functions in drivers/infiniband/sw/rxe/rxe_net.c, within the rxe_mcast_add() function in drivers/infiniband/sw/rxe/rxe_mcast.c, within the rxe_dealloc(), rxe_init_device_param(), rxe_init_port_param() and rxe_set_mtu() functions in drivers/infiniband/sw/rxe/rxe.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102915
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57798
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the drm_dp_mst_up_req_work() and drm_dp_mst_handle_up_req() functions in drivers/gpu/drm/display/drm_dp_mst_topology.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102908
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57801
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the mlx5_esw_for_each_rep() function in drivers/net/ethernet/mellanox/mlx5/core/eswitch_offloads.c, within the mlx5_esw_ipsec_restore_dest_uplink() function in drivers/net/ethernet/mellanox/mlx5/core/esw/ipsec_fs.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102976
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57804
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the mpi3mr_read_tsu_interval(), mpi3mr_free_mem(), mpi3mr_free_config_dma_memory() and mpi3mr_process_cfg_req() functions in drivers/scsi/mpi3mr/mpi3mr_fw.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102957
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57809
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the IMX_PCIE_FLAG_HAS_SERDES BIT(), imx_pcie_suspend_noirq() and imx_pcie_resume_noirq() functions in drivers/pci/controller/dwc/pci-imx6.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102958
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57838
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the arch_init_kprobes() function in arch/s390/kernel/kprobes.c, within the SYM_CODE_START() function in arch/s390/kernel/entry.S. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102912
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57849
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cpumsf_pmu_stop() function in arch/s390/kernel/perf_cpum_sf.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102968
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57850
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the jffs2_rtime_decompress() function in fs/jffs2/compr_rtime.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102910
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57857
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the siw_query_device(), siw_query_port() and siw_query_qp() functions in drivers/infiniband/sw/siw/siw_verbs.c, within the siw_device_create(), siw_netdev_event() and siw_newlink() functions in drivers/infiniband/sw/siw/siw_main.c, within the siw_create_listen() and siw_cep_set_free_and_put() functions in drivers/infiniband/sw/siw/siw_cm.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102897
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57874
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the tagged_addr_ctrl_get() and tagged_addr_ctrl_set() functions in arch/arm64/kernel/ptrace.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102936
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57876
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the drm_dp_mst_topology_mgr_set_mst(), EXPORT_SYMBOL(), update_msg_rx_state() and drm_dp_mst_hpd_irq_handle_event() functions in drivers/gpu/drm/display/drm_dp_mst_topology.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102907
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57887
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the adv7533_parse_dt() function in drivers/gpu/drm/bridge/adv7511/adv7533.c, within the adv7511_probe(), i2c_unregister_device() and adv7511_remove() functions in drivers/gpu/drm/bridge/adv7511/adv7511_drv.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102977
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57888
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the workqueue_softirq_dead(), __flush_workqueue() and start_flush_work() functions in kernel/workqueue.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102963
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57890
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the uverbs_request_next_ptr(), ib_uverbs_post_send() and ib_uverbs_unmarshall_recv() functions in drivers/infiniband/core/uverbs_cmd.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102905
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57892
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the brelse() function in fs/ocfs2/quota_local.c, within the ocfs2_get_next_id() function in fs/ocfs2/quota_global.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102918
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57893
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the DEFINE_SPINLOCK() and snd_seq_oss_synth_sysex() functions in sound/core/seq/oss/seq_oss_synth.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102904
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57896
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the close_ctree() function in fs/btrfs/disk-io.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102932
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57897
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the svm_migrate_copy_to_vram() and svm_migrate_copy_to_ram() functions in drivers/gpu/drm/amd/amdkfd/kfd_migrate.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102964
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57899
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the ieee80211_mbss_info_change_notify() function in net/mac80211/mesh.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102931
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57903
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the sk_setsockopt() function in net/core/sock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103048
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57904
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the at91_ts_register() function in drivers/iio/adc/at91_adc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103002
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57906
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ads8688_trigger_handler() function in drivers/iio/adc/ti-ads8688.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103003
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57907
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the rockchip_saradc_trigger_handler() function in drivers/iio/adc/rockchip_saradc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103004
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57908
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the kmx61_trigger_handler() function in drivers/iio/imu/kmx61.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103006
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57910
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the vcnl4035_trigger_consumer_handler() function in drivers/iio/light/vcnl4035.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103007
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57911
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the iio_simple_dummy_trigger_h() function in drivers/iio/dummy/iio_simple_dummy_buffer.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103008
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57912
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the zpa2326_fill_sample_buffer() function in drivers/iio/pressure/zpa2326.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103049
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57913
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the functionfs_bind() function in drivers/usb/gadget/function/f_fs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103018
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57915
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the gserial_disconnect() function in drivers/usb/gadget/function/u_serial.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103044
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57916
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the pci1xxxx_gpio_irq_handler() function in drivers/misc/mchp_pci1xxxx/mchp_pci1xxxx_gpio.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103037
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57922
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to reachable assertion within the drivers/gpu/drm/amd/display/dc/dml/dml_inline_defs.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103010
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57926
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the drm_dev_put() function in drivers/gpu/drm/mediatek/mtk_drm_drv.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103021
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57929
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the load_ablock() function in drivers/md/persistent-data/dm-array.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103123
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57932
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the gve_xdp_xmit() function in drivers/net/ethernet/google/gve/gve_tx.c, within the gve_turndown() function in drivers/net/ethernet/google/gve/gve_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103124
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57933
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the gve_xsk_pool_enable(), gve_xsk_pool_disable() and gve_xsk_wakeup() functions in drivers/net/ethernet/google/gve/gve_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103143
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57935
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the put_dip_ctx_idx() function in drivers/infiniband/hw/hns/hns_roce_hw_v2.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103135
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57936
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the drivers/infiniband/hw/bnxt_re/qplib_fp.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103134
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57940
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the exfat_readdir() function in fs/exfat/dir.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97651
Risk: High
CVSSv4.0: 6.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-8805
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions within the implementation of the HID over GATT Profile. A remote attacker on the local network can bypass implemented security restrictions and execute arbitrary code on the target system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103009
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21632
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ssp_get() function in arch/x86/kernel/fpu/regset.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103045
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21645
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the amd_pmc_suspend_handler() function in drivers/platform/x86/amd/pmc/pmc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103051
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21646
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the afs_deliver_yfsvl_get_cell_name() function in fs/afs/vlclient.c, within the afs_vl_get_cell_name() and yfs_check_canonical_cell_name() functions in fs/afs/vl_alias.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103031
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21649
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the hclge_ptp_set_tx_info() function in drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_ptp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103015
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21650
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the hclgevf_get_regs_len() and hclgevf_get_regs() functions in drivers/net/ethernet/hisilicon/hns3/hns3vf/hclgevf_regs.c, within the hclge_fetch_pf_reg() function in drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_regs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103046
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21651
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the hclge_misc_irq_init(), hclge_init_ae_dev() and hclge_uninit_ae_dev() functions in drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103132
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21656
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the drivetemp_scsi_command() function in drivers/hwmon/drivetemp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103129
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21662
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the cmd_work_handler() function in drivers/net/ethernet/mellanox/mlx5/core/cmd.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsConfidential Computing Module: 15-SP6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1
kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1
kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1
kernel-coco: before 6.4.0-15061.12.coco15sp6.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.