SUSE update for the Linux Kernel



| Updated: 2025-04-08
Risk High
Patch available YES
Number of vulnerabilities 343
CVE-ID CVE-2023-52489
CVE-2023-52923
CVE-2024-26596
CVE-2024-26924
CVE-2024-27397
CVE-2024-35839
CVE-2024-36476
CVE-2024-36908
CVE-2024-36915
CVE-2024-39282
CVE-2024-39480
CVE-2024-41042
CVE-2024-43913
CVE-2024-44934
CVE-2024-44996
CVE-2024-45828
CVE-2024-46680
CVE-2024-46765
CVE-2024-46800
CVE-2024-46896
CVE-2024-47141
CVE-2024-47143
CVE-2024-47678
CVE-2024-47809
CVE-2024-48873
CVE-2024-48881
CVE-2024-49569
CVE-2024-49854
CVE-2024-49884
CVE-2024-49915
CVE-2024-49944
CVE-2024-49951
CVE-2024-49952
CVE-2024-49998
CVE-2024-50016
CVE-2024-50018
CVE-2024-50039
CVE-2024-50047
CVE-2024-50051
CVE-2024-50106
CVE-2024-50143
CVE-2024-50151
CVE-2024-50154
CVE-2024-50199
CVE-2024-50202
CVE-2024-50203
CVE-2024-50211
CVE-2024-50228
CVE-2024-50252
CVE-2024-50256
CVE-2024-50262
CVE-2024-50272
CVE-2024-50278
CVE-2024-50279
CVE-2024-50280
CVE-2024-50296
CVE-2024-50299
CVE-2024-52332
CVE-2024-53043
CVE-2024-53050
CVE-2024-53051
CVE-2024-53055
CVE-2024-53056
CVE-2024-53064
CVE-2024-53090
CVE-2024-53091
CVE-2024-53095
CVE-2024-53099
CVE-2024-53103
CVE-2024-53105
CVE-2024-53110
CVE-2024-53111
CVE-2024-53113
CVE-2024-53117
CVE-2024-53118
CVE-2024-53119
CVE-2024-53120
CVE-2024-53121
CVE-2024-53122
CVE-2024-53125
CVE-2024-53126
CVE-2024-53127
CVE-2024-53129
CVE-2024-53130
CVE-2024-53131
CVE-2024-53133
CVE-2024-53134
CVE-2024-53136
CVE-2024-53138
CVE-2024-53141
CVE-2024-53142
CVE-2024-53144
CVE-2024-53146
CVE-2024-53148
CVE-2024-53150
CVE-2024-53151
CVE-2024-53154
CVE-2024-53155
CVE-2024-53156
CVE-2024-53157
CVE-2024-53158
CVE-2024-53159
CVE-2024-53160
CVE-2024-53161
CVE-2024-53162
CVE-2024-53164
CVE-2024-53166
CVE-2024-53168
CVE-2024-53169
CVE-2024-53170
CVE-2024-53171
CVE-2024-53172
CVE-2024-53173
CVE-2024-53174
CVE-2024-53175
CVE-2024-53179
CVE-2024-53180
CVE-2024-53185
CVE-2024-53188
CVE-2024-53190
CVE-2024-53191
CVE-2024-53194
CVE-2024-53195
CVE-2024-53196
CVE-2024-53197
CVE-2024-53198
CVE-2024-53200
CVE-2024-53201
CVE-2024-53202
CVE-2024-53206
CVE-2024-53207
CVE-2024-53208
CVE-2024-53209
CVE-2024-53210
CVE-2024-53213
CVE-2024-53214
CVE-2024-53215
CVE-2024-53216
CVE-2024-53217
CVE-2024-53222
CVE-2024-53224
CVE-2024-53227
CVE-2024-53229
CVE-2024-53230
CVE-2024-53231
CVE-2024-53232
CVE-2024-53233
CVE-2024-53234
CVE-2024-53236
CVE-2024-53237
CVE-2024-53239
CVE-2024-53240
CVE-2024-53241
CVE-2024-53685
CVE-2024-53690
CVE-2024-54680
CVE-2024-55639
CVE-2024-55881
CVE-2024-55916
CVE-2024-56369
CVE-2024-56372
CVE-2024-56531
CVE-2024-56532
CVE-2024-56533
CVE-2024-56536
CVE-2024-56538
CVE-2024-56539
CVE-2024-56543
CVE-2024-56546
CVE-2024-56548
CVE-2024-56549
CVE-2024-56551
CVE-2024-56557
CVE-2024-56558
CVE-2024-56562
CVE-2024-56566
CVE-2024-56567
CVE-2024-56568
CVE-2024-56569
CVE-2024-56570
CVE-2024-56571
CVE-2024-56572
CVE-2024-56573
CVE-2024-56574
CVE-2024-56575
CVE-2024-56576
CVE-2024-56577
CVE-2024-56578
CVE-2024-56582
CVE-2024-56584
CVE-2024-56587
CVE-2024-56588
CVE-2024-56589
CVE-2024-56590
CVE-2024-56593
CVE-2024-56594
CVE-2024-56595
CVE-2024-56596
CVE-2024-56597
CVE-2024-56598
CVE-2024-56599
CVE-2024-5660
CVE-2024-56602
CVE-2024-56603
CVE-2024-56604
CVE-2024-56605
CVE-2024-56606
CVE-2024-56607
CVE-2024-56609
CVE-2024-56611
CVE-2024-56614
CVE-2024-56615
CVE-2024-56616
CVE-2024-56617
CVE-2024-56619
CVE-2024-56620
CVE-2024-56622
CVE-2024-56623
CVE-2024-56625
CVE-2024-56629
CVE-2024-56630
CVE-2024-56631
CVE-2024-56632
CVE-2024-56634
CVE-2024-56635
CVE-2024-56636
CVE-2024-56637
CVE-2024-56641
CVE-2024-56642
CVE-2024-56643
CVE-2024-56644
CVE-2024-56645
CVE-2024-56648
CVE-2024-56649
CVE-2024-56651
CVE-2024-56654
CVE-2024-56656
CVE-2024-56659
CVE-2024-56660
CVE-2024-56661
CVE-2024-56662
CVE-2024-56663
CVE-2024-56664
CVE-2024-56667
CVE-2024-56670
CVE-2024-56672
CVE-2024-56675
CVE-2024-56677
CVE-2024-56678
CVE-2024-56681
CVE-2024-56683
CVE-2024-56687
CVE-2024-56688
CVE-2024-56690
CVE-2024-56691
CVE-2024-56694
CVE-2024-56698
CVE-2024-56700
CVE-2024-56701
CVE-2024-56704
CVE-2024-56705
CVE-2024-56708
CVE-2024-56709
CVE-2024-56712
CVE-2024-56716
CVE-2024-56722
CVE-2024-56723
CVE-2024-56724
CVE-2024-56729
CVE-2024-56739
CVE-2024-56741
CVE-2024-56745
CVE-2024-56746
CVE-2024-56747
CVE-2024-56748
CVE-2024-56752
CVE-2024-56754
CVE-2024-56755
CVE-2024-56756
CVE-2024-56759
CVE-2024-56760
CVE-2024-56765
CVE-2024-56766
CVE-2024-56767
CVE-2024-56769
CVE-2024-56774
CVE-2024-56775
CVE-2024-56776
CVE-2024-56777
CVE-2024-56778
CVE-2024-56779
CVE-2024-56780
CVE-2024-56787
CVE-2024-57791
CVE-2024-57792
CVE-2024-57793
CVE-2024-57795
CVE-2024-57798
CVE-2024-57801
CVE-2024-57804
CVE-2024-57809
CVE-2024-57838
CVE-2024-57849
CVE-2024-57850
CVE-2024-57857
CVE-2024-57874
CVE-2024-57876
CVE-2024-57887
CVE-2024-57888
CVE-2024-57890
CVE-2024-57892
CVE-2024-57893
CVE-2024-57896
CVE-2024-57897
CVE-2024-57899
CVE-2024-57903
CVE-2024-57904
CVE-2024-57906
CVE-2024-57907
CVE-2024-57908
CVE-2024-57910
CVE-2024-57911
CVE-2024-57912
CVE-2024-57913
CVE-2024-57915
CVE-2024-57916
CVE-2024-57922
CVE-2024-57926
CVE-2024-57929
CVE-2024-57932
CVE-2024-57933
CVE-2024-57935
CVE-2024-57936
CVE-2024-57940
CVE-2024-8805
CVE-2025-21632
CVE-2025-21645
CVE-2025-21646
CVE-2025-21649
CVE-2025-21650
CVE-2025-21651
CVE-2025-21656
CVE-2025-21662
CWE-ID CWE-362
CWE-667
CWE-125
CWE-399
CWE-476
CWE-119
CWE-20
CWE-401
CWE-416
CWE-190
CWE-908
CWE-388
CWE-835
CWE-415
CWE-369
CWE-682
CWE-191
CWE-366
CWE-665
CWE-787
CWE-1037
CWE-254
CWE-617
CWE-284
Exploitation vector Network
Public exploit Vulnerability #95 is being exploited in the wild.
Vulnerability #125 is being exploited in the wild.
Vulnerable software
Confidential Computing Module
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15
Operating systems & Components / Operating system

kernel-source-coco
Operating systems & Components / Operating system package or component

kernel-devel-coco
Operating systems & Components / Operating system package or component

kernel-coco-vdso-debuginfo
Operating systems & Components / Operating system package or component

kernel-syms-coco
Operating systems & Components / Operating system package or component

reiserfs-kmp-coco-debuginfo
Operating systems & Components / Operating system package or component

reiserfs-kmp-coco
Operating systems & Components / Operating system package or component

kernel-coco_debug-debugsource
Operating systems & Components / Operating system package or component

kernel-coco_debug-debuginfo
Operating systems & Components / Operating system package or component

kernel-coco-debuginfo
Operating systems & Components / Operating system package or component

kernel-coco_debug-devel-debuginfo
Operating systems & Components / Operating system package or component

kernel-coco_debug-devel
Operating systems & Components / Operating system package or component

kernel-coco-debugsource
Operating systems & Components / Operating system package or component

kernel-coco-devel
Operating systems & Components / Operating system package or component

kernel-coco_debug
Operating systems & Components / Operating system package or component

kernel-coco
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 343 vulnerabilities.

1) Race condition

EUVDB-ID: #VU89388

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52489

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the section_deactivate() function in mm/sparse.c. A local user can exploit the race and escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper locking

EUVDB-ID: #VU103086

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52923

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the nft_rbtree_cmp(), __nft_rbtree_lookup(), nft_rbtree_get(), nft_rbtree_gc_elem(), nft_rbtree_activate(), nft_rbtree_flush() and nft_rbtree_gc() functions in net/netfilter/nft_set_rbtree.c, within the pipapo_drop(), pipapo_gc() and nft_pipapo_activate() functions in net/netfilter/nft_set_pipapo.c, within the nft_rhash_cmp(), nft_rhash_activate(), nft_rhash_flush(), nft_rhash_deactivate(), nft_rhash_gc() and nft_rhash_destroy() functions in net/netfilter/nft_set_hash.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Out-of-bounds read

EUVDB-ID: #VU90362

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26596

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the EXPORT_SYMBOL_GPL() and dsa_user_changeupper() functions in net/dsa/user.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Resource management error

EUVDB-ID: #VU89055

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26924

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources within the nft_pipapo_remove() function in net/netfilter/nft_set_pipapo.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Improper locking

EUVDB-ID: #VU92027

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27397

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the __nft_rbtree_insert(), nft_rbtree_deactivate() and nft_rbtree_gc() functions in net/netfilter/nft_set_rbtree.c, within the pipapo_get(), nft_pipapo_get(), nft_pipapo_insert(), pipapo_gc() and pipapo_deactivate() functions in net/netfilter/nft_set_pipapo.c, within the nft_rhash_key(), nft_rhash_cmp(), nft_rhash_lookup(), nft_rhash_get(), nft_rhash_update(), nft_rhash_insert() and nft_rhash_deactivate() functions in net/netfilter/nft_set_hash.c, within the nft_trans_gc_catchall_sync() and nf_tables_valid_genid() functions in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Improper locking

EUVDB-ID: #VU93386

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35839

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the nf_reject6_fill_skb_dst() and nf_send_reset6() functions in net/ipv6/netfilter/nf_reject_ipv6.c, within the nf_reject_fill_skb_dst() and nf_send_reset() functions in net/ipv4/netfilter/nf_reject_ipv4.c, within the br_nf_pre_routing_finish_ipv6() function in net/bridge/br_netfilter_ipv6.c, within the br_nf_pre_routing_finish_bridge(), br_nf_ipv4_daddr_was_changed(), bridge_parent_rtable(), skb_dst_set_noref(), setup_pre_routing(), br_nf_forward_finish(), ip_sabotage_in() and br_nf_pre_routing_finish_bridge_slow() functions in net/bridge/br_netfilter_hooks.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) NULL pointer dereference

EUVDB-ID: #VU102920

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36476

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the send_io_resp_imm() function in drivers/infiniband/ulp/rtrs/rtrs-srv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Resource management error

EUVDB-ID: #VU93278

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36908

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the iocg_pay_debt() function in block/blk-iocost.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Out-of-bounds read

EUVDB-ID: #VU90268

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36915

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the nfc_llcp_setsockopt() function in net/nfc/llcp_sock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Resource management error

EUVDB-ID: #VU102972

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39282

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the t7xx_fsm_broadcast_state(), fsm_main_thread() and t7xx_fsm_append_cmd() functions in drivers/net/wwan/t7xx/t7xx_state_monitor.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Buffer overflow

EUVDB-ID: #VU93827

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39480

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the kdb_printf() function in kernel/debug/kdb/kdb_io.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Input validation error

EUVDB-ID: #VU95003

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41042

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the nf_tables_rule_release(), nft_chain_validate(), nft_chain_validate_hooks() and nft_validate_register_store() functions in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Memory leak

EUVDB-ID: #VU96511

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43913

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the devm_apple_nvme_mempool_destroy() and apple_nvme_probe() functions in drivers/nvme/host/apple.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Use-after-free

EUVDB-ID: #VU96517

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-44934

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the br_multicast_del_port() function in net/bridge/br_multicast.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Resource management error

EUVDB-ID: #VU96879

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-44996

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the __vsock_recvmsg() function in net/vmw_vsock/vsock_bpf.c, within the __vsock_dgram_recvmsg(), vsock_connectible_recvmsg() and release_sock() functions in net/vmw_vsock/af_vsock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) NULL pointer dereference

EUVDB-ID: #VU102922

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45828

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the hci_dma_cleanup() function in drivers/i3c/master/mipi-i3c-hci/dma.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Input validation error

EUVDB-ID: #VU97270

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46680

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ps_wakeup(), btnxpuart_close() and nxp_serdev_remove() functions in drivers/bluetooth/btnxpuart.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) NULL pointer dereference

EUVDB-ID: #VU97522

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46765

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ice_xsk_pool_setup() function in drivers/net/ethernet/intel/ice/ice_xsk.c, within the ice_clear_hw_tbls(), ice_xdp_setup_prog() and ice_xdp() functions in drivers/net/ethernet/intel/ice/ice_main.c, within the ice_vsi_free(), ice_vsi_alloc() and ice_vsi_rebuild() functions in drivers/net/ethernet/intel/ice/ice_lib.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Use-after-free

EUVDB-ID: #VU97501

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46800

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the qdisc_enqueue() function in net/sched/sch_netem.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) NULL pointer dereference

EUVDB-ID: #VU102923

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46896

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the amdgpu_job_set_resources() and amdgpu_job_free_resources() functions in drivers/gpu/drm/amd/amdgpu/amdgpu_job.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) NULL pointer dereference

EUVDB-ID: #VU102924

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47141

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the pr_fmt(), pinmux_can_be_used_for_gpio(), pin_request(), pin_free(), pinmux_enable_setting(), pinmux_disable_setting() and pinmux_pins_show() functions in drivers/pinctrl/pinmux.c, within the pinctrl_register_one_pin() function in drivers/pinctrl/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Improper locking

EUVDB-ID: #VU102949

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47143

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the check_unmap() function in kernel/dma/debug.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Improper locking

EUVDB-ID: #VU99030

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47678

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the icmpv6_mask_allow(), icmpv6_global_allow(), icmpv6_xrlim_allow(), icmp6_send() and icmpv6_echo_reply() functions in net/ipv6/icmp.c, within the __SPIN_LOCK_UNLOCKED(), icmpv4_mask_allow(), icmpv4_global_allow(), icmpv4_xrlim_allow(), icmp_reply() and __icmp_send() functions in net/ipv4/icmp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) NULL pointer dereference

EUVDB-ID: #VU102925

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47809

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the validate_lock_args() function in fs/dlm/lock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) NULL pointer dereference

EUVDB-ID: #VU102926

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-48873

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the rtw89_update_6ghz_rnr_chan() function in drivers/net/wireless/realtek/rtw89/fw.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) NULL pointer dereference

EUVDB-ID: #VU102927

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-48881

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the cache_set_flush() function in drivers/md/bcache/super.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

27) Improper locking

EUVDB-ID: #VU102946

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49569

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the nvme_stop_keep_alive() function in drivers/nvme/host/rdma.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

28) Use-after-free

EUVDB-ID: #VU98892

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49854

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the bfq_prepare_request() and bfq_init_rq() functions in block/bfq-iosched.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

29) Use-after-free

EUVDB-ID: #VU98867

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49884

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ext4_split_extent_at() and ext4_ext_dirty() functions in fs/ext4/extents.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

30) NULL pointer dereference

EUVDB-ID: #VU98932

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49915

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the dcn32_init_hw() function in drivers/gpu/drm/amd/display/dc/hwss/dcn32/dcn32_hwseq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

31) NULL pointer dereference

EUVDB-ID: #VU98953

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49944

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the sctp_listen_start() function in net/sctp/socket.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

32) Resource management error

EUVDB-ID: #VU99171

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49951

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the cmd_status_rsp(), mgmt_index_added(), mgmt_power_on() and __mgmt_power_off() functions in net/bluetooth/mgmt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

33) Buffer overflow

EUVDB-ID: #VU99151

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49952

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the nf_dup_ipv6_route() and nf_dup_ipv6() functions in net/ipv6/netfilter/nf_dup_ipv6.c, within the nf_dup_ipv4() function in net/ipv4/netfilter/nf_dup_ipv4.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

34) NULL pointer dereference

EUVDB-ID: #VU98944

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49998

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the EXPORT_SYMBOL_GPL() and dsa_switch_shutdown() functions in net/dsa/dsa.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

35) Integer overflow

EUVDB-ID: #VU99090

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50016

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the dp_set_test_pattern() function in drivers/gpu/drm/amd/display/dc/link/accessories/link_dp_cts.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

36) Integer overflow

EUVDB-ID: #VU99091

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50018

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the NETDEVICE_SHOW_RW() and napi_defer_hard_irqs_store() functions in net/core/net-sysfs.c, within the netif_elide_gro() function in Documentation/networking/net_cachelines/net_device.rst. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

37) Resource management error

EUVDB-ID: #VU99133

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50039

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the qdisc_skb_cb() function in net/sched/sch_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

38) Improper locking

EUVDB-ID: #VU98995

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50047

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the SMB2_negotiate() function in fs/smb/client/smb2pdu.c, within the smb2_get_enc_key(), crypt_message(), smb3_init_transform_rq() and decrypt_raw_data() functions in fs/smb/client/smb2ops.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

39) Use-after-free

EUVDB-ID: #VU102917

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50051

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mpc52xx_spi_remove() function in drivers/spi/spi-mpc52xx.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

40) Use-after-free

EUVDB-ID: #VU99802

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50106

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the destroy_delegation(), nfsd4_revoke_states(), nfs4_laundromat(), nfsd4_free_stateid() and nfsd4_delegreturn() functions in fs/nfsd/nfs4state.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

41) Use of uninitialized resource

EUVDB-ID: #VU100084

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50143

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the udf_current_aext() function in fs/udf/inode.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

42) Out-of-bounds read

EUVDB-ID: #VU100066

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50151

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the SMB2_ioctl_init() function in fs/cifs/smb2pdu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

43) Use-after-free

EUVDB-ID: #VU100062

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50154

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the reqsk_queue_unlink() and reqsk_timer_handler() functions in net/ipv4/inet_connection_sock.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

44) Use-after-free

EUVDB-ID: #VU100120

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50199

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the unuse_mm() function in mm/swapfile.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

45) Input validation error

EUVDB-ID: #VU100130

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50202

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the nilfs_lookup(), nilfs_do_unlink(), nilfs_rename() and nilfs_get_parent() functions in fs/nilfs2/namei.c, within the nilfs_readdir(), nilfs_find_entry() and nilfs_inode_by_name() functions in fs/nilfs2/dir.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

46) Buffer overflow

EUVDB-ID: #VU100139

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50203

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the prepare_trampoline() function in arch/arm64/net/bpf_jit_comp.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

47) Improper error handling

EUVDB-ID: #VU100134

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50211

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the udf_truncate_extents() function in fs/udf/truncate.c, within the udf_try_read_meta() function in fs/udf/partition.c, within the udf_map_block(), udf_extend_file(), udf_delete_aext() and inode_bmap() functions in fs/udf/inode.c, within the udf_fiiter_init() and udf_fiiter_append_blk() functions in fs/udf/directory.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

48) Improper locking

EUVDB-ID: #VU100182

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50228

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the shmem_getattr() function in mm/shmem.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

49) Memory leak

EUVDB-ID: #VU100163

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50252

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the mlxsw_sp_ipip_ol_netdev_change_gre6() function in drivers/net/ethernet/mellanox/mlxsw/spectrum_ipip.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

50) Improper error handling

EUVDB-ID: #VU100192

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50256

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the nf_reject6_fill_skb_dst() and nf_send_reset6() functions in net/ipv6/netfilter/nf_reject_ipv6.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

51) Out-of-bounds read

EUVDB-ID: #VU100173

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50262

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the trie_get_next_key() function in kernel/bpf/lpm_trie.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

52) Infinite loop

EUVDB-ID: #VU100640

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50272

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the filemap_read() function in mm/filemap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

53) Out-of-bounds read

EUVDB-ID: #VU100619

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50278

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the get_cache_dev_size() and cache_preresume() functions in drivers/md/dm-cache-target.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

54) Out-of-bounds read

EUVDB-ID: #VU100620

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50279

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the can_resize() function in drivers/md/dm-cache-target.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

55) Use-after-free

EUVDB-ID: #VU100614

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50280

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the check_migrations(), destroy(), cache_create() and cache_ctr() functions in drivers/md/dm-cache-target.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

56) NULL pointer dereference

EUVDB-ID: #VU100626

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50296

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the hnae3_unregister_ae_algo_prepare() function in drivers/net/ethernet/hisilicon/hns3/hnae3.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

57) Input validation error

EUVDB-ID: #VU100631

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50299

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the sctp_sf_ootb() function in net/sctp/sm_statefuns.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

58) Resource management error

EUVDB-ID: #VU102974

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-52332

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the igb_init_module() function in drivers/net/ethernet/intel/igb/igb_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

59) Input validation error

EUVDB-ID: #VU100747

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53043

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the mctp_i2c_header_create() function in drivers/net/mctp/mctp-i2c.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

60) NULL pointer dereference

EUVDB-ID: #VU100709

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53050

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the intel_dp_hdcp2_get_capability() function in drivers/gpu/drm/i915/display/intel_dp_hdcp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

61) NULL pointer dereference

EUVDB-ID: #VU100710

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53051

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the intel_hdcp_read_valid_bksv() function in drivers/gpu/drm/i915/display/intel_hdcp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

62) Infinite loop

EUVDB-ID: #VU100734

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53055

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the iwl_mvm_umac_scan_cfg_channels_v6_6g() function in drivers/net/wireless/intel/iwlwifi/mvm/scan.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

63) NULL pointer dereference

EUVDB-ID: #VU100711

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53056

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mtk_crtc_destroy() function in drivers/gpu/drm/mediatek/mtk_crtc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

64) NULL pointer dereference

EUVDB-ID: #VU100714

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53064

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the idpf_init_hard_reset() function in drivers/net/ethernet/intel/idpf/idpf_lib.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

65) Improper locking

EUVDB-ID: #VU100833

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53090

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the afs_deferred_free_worker(), afs_alloc_call(), afs_put_call(), afs_wake_up_call_waiter() and afs_wake_up_async_call() functions in fs/afs/rxrpc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

66) Input validation error

EUVDB-ID: #VU100836

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53091

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the include/net/tls.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

67) Use-after-free

EUVDB-ID: #VU100830

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53095

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the clean_demultiplex_info(), cifs_put_tcp_session() and generic_ip_connect() functions in fs/smb/client/connect.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

68) Out-of-bounds read

EUVDB-ID: #VU100938

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53099

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the bpf_link_show_fdinfo() function in kernel/bpf/syscall.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

69) NULL pointer dereference

EUVDB-ID: #VU101106

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53103

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the hvs_destruct() function in net/vmw_vsock/hyperv_transport.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

70) Double free

EUVDB-ID: #VU101108

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53105

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the __page_cache_release() function in mm/swap.c, within the free_pages_prepare() function in mm/page_alloc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

71) Buffer overflow

EUVDB-ID: #VU101116

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53110

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the vp_vdpa_probe() function in drivers/vdpa/virtio_pci/vp_vdpa.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

72) Integer overflow

EUVDB-ID: #VU101110

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53111

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the mm/mremap.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

73) NULL pointer dereference

EUVDB-ID: #VU101103

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53113

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the alloc_pages_bulk_noprof() function in mm/page_alloc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

74) Memory leak

EUVDB-ID: #VU101096

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53117

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the virtio_transport_send_pkt_info() function in net/vmw_vsock/virtio_transport_common.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

75) Memory leak

EUVDB-ID: #VU101097

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53118

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the vsock_sk_destruct() function in net/vmw_vsock/af_vsock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

76) Memory leak

EUVDB-ID: #VU101098

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53119

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the virtio_transport_recv_listen() function in net/vmw_vsock/virtio_transport_common.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

77) NULL pointer dereference

EUVDB-ID: #VU101105

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53120

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mlx5_tc_ct_entry_add_rule() function in drivers/net/ethernet/mellanox/mlx5/core/en/tc_ct.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

78) Memory leak

EUVDB-ID: #VU101099

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53121

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the lookup_fte_locked() function in drivers/net/ethernet/mellanox/mlx5/core/fs_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

79) Division by zero

EUVDB-ID: #VU101111

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53122

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the mptcp_rcv_space_adjust() function in net/mptcp/protocol.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

80) Resource management error

EUVDB-ID: #VU101233

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53125

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the find_equal_scalars() function in kernel/bpf/verifier.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

81) Buffer overflow

EUVDB-ID: #VU101235

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53126

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the psnet_open_pf_bar() function in drivers/vdpa/solidrun/snet_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

82) Buffer overflow

EUVDB-ID: #VU101231

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53127

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the dw_mci_init_slot() function in drivers/mmc/host/dw_mmc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

83) NULL pointer dereference

EUVDB-ID: #VU101224

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53129

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the vop_plane_atomic_async_check() function in drivers/gpu/drm/rockchip/rockchip_drm_vop.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

84) NULL pointer dereference

EUVDB-ID: #VU101225

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53130

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the nilfs_grab_buffer() function in fs/nilfs2/page.c, within the nilfs_mdt_create_block() function in fs/nilfs2/mdt.c, within the nilfs_gccache_submit_read_data() function in fs/nilfs2/gcinode.c, within the nilfs_btnode_create_block() and nilfs_btnode_submit_block() functions in fs/nilfs2/btnode.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

85) NULL pointer dereference

EUVDB-ID: #VU101226

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53131

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the __nilfs_get_page_block() function in fs/nilfs2/page.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

86) Use-after-free

EUVDB-ID: #VU101222

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53133

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the dc_state_create_copy() function in drivers/gpu/drm/amd/display/dc/core/dc_state.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

87) Input validation error

EUVDB-ID: #VU101236

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53134

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the imx93_blk_ctrl_remove() function in drivers/pmdomain/imx/imx93-blk-ctrl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

88) Improper locking

EUVDB-ID: #VU101229

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53136

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the shmem_getattr() function in mm/shmem.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

89) Incorrect calculation

EUVDB-ID: #VU101234

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53138

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the tx_sync_info_get(), mlx5e_ktls_tx_handle_resync_dump_comp() and mlx5e_ktls_tx_handle_ooo() functions in drivers/net/ethernet/mellanox/mlx5/core/en_accel/ktls_tx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

90) Input validation error

EUVDB-ID: #VU101348

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53141

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the bitmap_ip_uadt() function in net/netfilter/ipset/ip_set_bitmap_ip.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

91) Use of uninitialized resource

EUVDB-ID: #VU101347

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53142

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the do_name() and do_copy() functions in init/initramfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

92) Input validation error

EUVDB-ID: #VU101815

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53144

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the hci_user_confirm_request_evt() function in net/bluetooth/hci_event.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

93) Integer overflow

EUVDB-ID: #VU101921

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53146

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the decode_cb_compound4res() function in fs/nfsd/nfs4callback.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

94) Buffer overflow

EUVDB-ID: #VU101927

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53148

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the comedi_mmap() function in drivers/comedi/comedi_fops.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

95) Out-of-bounds read

EUVDB-ID: #VU101910

Risk: High

CVSSv4.0: 6.8 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber]

CVE-ID: CVE-2024-53150

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the DESC_LENGTH_CHECK(), validate_clock_source() and validate_clock_selector() functions in sound/usb/clock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.

96) Integer overflow

EUVDB-ID: #VU101922

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53151

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the xdr_check_write_chunk() function in net/sunrpc/xprtrdma/svc_rdma_recvfrom.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

97) NULL pointer dereference

EUVDB-ID: #VU101913

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53154

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the applnco_probe() function in drivers/clk/clk-apple-nco.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

98) Use of uninitialized resource

EUVDB-ID: #VU101917

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53155

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the ocfs2_file_write_iter() and ocfs2_file_read_iter() functions in fs/ocfs2/file.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

99) Out-of-bounds read

EUVDB-ID: #VU101911

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53156

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the htc_connect_service() function in drivers/net/wireless/ath/ath9k/htc_hst.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

100) NULL pointer dereference

EUVDB-ID: #VU101914

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53157

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the scpi_dvfs_get_info() function in drivers/firmware/arm_scpi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

101) Integer underflow

EUVDB-ID: #VU101924

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53158

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer underflow within the geni_se_clk_tbl_get() function in drivers/soc/qcom/qcom-geni-se.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

102) Buffer overflow

EUVDB-ID: #VU101925

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53159

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the store_target_temp(), store_temp_tolerance() and store_weight_temp() functions in drivers/hwmon/nct6775-core.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

103) Race condition within a thread

EUVDB-ID: #VU101926

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53160

CWE-ID: CWE-366 - Race Condition within a Thread

Exploit availability: No

Description

The vulnerability allows a local user to corrupt data.

The vulnerability exists due to a data race within the krc_count(), schedule_delayed_monitor_work() and kvfree_call_rcu() functions in kernel/rcu/tree.c. A local user can corrupt data.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

104) Integer overflow

EUVDB-ID: #VU101923

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53161

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the bluefield_edac_check() function in drivers/edac/bluefield_edac.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

105) Out-of-bounds read

EUVDB-ID: #VU101912

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53162

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the uof_get_name() function in drivers/crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

106) Resource management error

EUVDB-ID: #VU102248

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53164

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the choke_drop_by_idx() function in net/sched/sch_choke.c, within the cake_drop() function in net/sched/sch_cake.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

107) Use-after-free

EUVDB-ID: #VU102048

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53166

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the bfq_choose_req(), bfqq_request_over_limit() and bfq_limit_depth() functions in block/bfq-iosched.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

108) Use-after-free

EUVDB-ID: #VU102061

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53168

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the xs_create_sock() function in net/sunrpc/xprtsock.c, within the svc_create_socket() function in net/sunrpc/svcsock.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

109) Race condition

EUVDB-ID: #VU102220

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53169

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the EXPORT_SYMBOL_GPL() function in drivers/nvme/host/core.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

110) Use-after-free

EUVDB-ID: #VU102060

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53170

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the del_gendisk() function in block/genhd.c, within the blk_register_queue() function in block/blk-sysfs.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

111) Use-after-free

EUVDB-ID: #VU102059

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53171

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the get_znodes_to_commit() function in fs/ubifs/tnc_commit.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

112) Resource management error

EUVDB-ID: #VU102249

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53172

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the alloc_ai(), scan_fast() and ubi_attach() functions in drivers/mtd/ubi/attach.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

113) Use-after-free

EUVDB-ID: #VU102058

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53173

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the nfs4_open_release() function in fs/nfs/nfs4proc.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

114) Use-after-free

EUVDB-ID: #VU102057

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53174

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the c_show() function in net/sunrpc/cache.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

115) Memory leak

EUVDB-ID: #VU102000

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53175

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the create_ipc_ns() function in ipc/namespace.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

116) Use-after-free

EUVDB-ID: #VU102054

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53179

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the smb2_get_sign_key(), smb2_find_smb_ses_unlocked(), smb2_calc_signature() and smb3_calc_signature() functions in fs/smb/client/smb2transport.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

117) Improper Initialization

EUVDB-ID: #VU102222

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53180

CWE-ID: CWE-665 - Improper Initialization

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper initialization within the snd_pcm_mmap_data_fault() function in sound/core/pcm_native.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

118) Use-after-free

EUVDB-ID: #VU102051

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53185

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the SMB2_negotiate() function in fs/smb/client/smb2pdu.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

119) NULL pointer dereference

EUVDB-ID: #VU102130

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53188

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ath12k_dp_cc_cleanup() function in drivers/net/wireless/ath/ath12k/dp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

120) Improper locking

EUVDB-ID: #VU102173

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53190

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the efuse_write_1byte() and read_efuse_byte() functions in drivers/net/wireless/realtek/rtlwifi/efuse.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

121) Double free

EUVDB-ID: #VU102194

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53191

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the ath12k_dp_free() function in drivers/net/wireless/ath/ath12k/dp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

122) Use-after-free

EUVDB-ID: #VU102049

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53194

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the pci_slot_release(), pci_bus_get() and make_slot_name() functions in drivers/pci/slot.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

123) Resource management error

EUVDB-ID: #VU102232

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53195

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the DECLARE_KVM_NVHE_PER_CPU(), kvm_arch_vcpu_postcreate(), kvm_arch_vcpu_run_pid_change(), kvm_vcpu_exit_request() and kvm_arch_vcpu_ioctl_run() functions in arch/arm64/kvm/arm.c, within the get_timer_map() function in arch/arm64/kvm/arch_timer.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

124) Improper error handling

EUVDB-ID: #VU102209

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53196

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the kvm_mmio_read_buf() and kvm_handle_mmio_return() functions in arch/arm64/kvm/mmio.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

125) Out-of-bounds write

EUVDB-ID: #VU102090

Risk: High

CVSSv4.0: 8.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber]

CVE-ID: CVE-2024-53197

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to compromise the affected system.

The vulnerability exists due to an out-of-bounds write error within the snd_usb_create_quirk(), snd_usb_extigy_boot_quirk(), mbox2_setup_48_24_magic() and snd_usb_mbox2_boot_quirk() functions in sound/usb/quirks.c. A local user can trigger an out-of-bounds write and execute arbitrary code on the system.

Note, the vulnerability is being actively exploited against Android devices.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.

126) Memory leak

EUVDB-ID: #VU102006

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53198

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the xenbus_dev_probe() function in drivers/xen/xenbus/xenbus_probe.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

127) NULL pointer dereference

EUVDB-ID: #VU102138

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53200

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the hwss_setup_dpp() function in drivers/gpu/drm/amd/display/dc/core/dc_hw_sequencer.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

128) NULL pointer dereference

EUVDB-ID: #VU102137

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53201

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the dcn20_program_pipe() function in drivers/gpu/drm/amd/display/dc/hwss/dcn20/dcn20_hwseq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

129) Memory leak

EUVDB-ID: #VU102005

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53202

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the fw_log_firmware_info() function in drivers/base/firmware_loader/main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

130) Use-after-free

EUVDB-ID: #VU102046

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53206

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the __inet_csk_reqsk_queue_drop() function in net/ipv4/inet_connection_sock.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

131) Improper locking

EUVDB-ID: #VU102176

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53207

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the mgmt_set_discoverable_complete(), mgmt_set_connectable_complete(), set_ssp_complete(), set_name_complete(), set_default_phy_complete(), start_discovery_complete(), stop_discovery_complete() and read_local_oob_ext_data_complete() functions in net/bluetooth/mgmt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

132) Use-after-free

EUVDB-ID: #VU102063

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53208

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mgmt_set_powered_complete() function in net/bluetooth/mgmt.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

133) NULL pointer dereference

EUVDB-ID: #VU102134

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53209

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the bnxt_set_rx_skb_mode() and bnxt_change_mtu() functions in drivers/net/ethernet/broadcom/bnxt/bnxt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

134) Memory leak

EUVDB-ID: #VU102004

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53210

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the iucv_sock_recvmsg() function in net/iucv/af_iucv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

135) Double free

EUVDB-ID: #VU102195

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53213

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the lan78xx_probe() function in drivers/net/usb/lan78xx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

136) Out-of-bounds read

EUVDB-ID: #VU102092

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53214

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the vfio_virt_config_read() and vfio_config_do_rw() functions in drivers/vfio/pci/vfio_pci_config.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

137) Improper error handling

EUVDB-ID: #VU102208

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53215

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the svc_rdma_proc_init() function in net/sunrpc/xprtrdma/svc_rdma.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

138) Use-after-free

EUVDB-ID: #VU102356

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53216

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in fs/nfsd/export.c. A local user can execute arbitrary code with elevated privileges.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

139) NULL pointer dereference

EUVDB-ID: #VU102133

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53217

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the nfsd4_process_cb_update() function in fs/nfsd/nfs4callback.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

140) NULL pointer dereference

EUVDB-ID: #VU102129

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53222

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the zram_add() function in drivers/block/zram/zram_drv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

141) NULL pointer dereference

EUVDB-ID: #VU102141

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53224

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mlx5_ib_dev_res_init(), mlx5_ib_stage_delay_drop_cleanup(), mlx5_ib_stage_dev_notifier_init() and STAGE_CREATE() functions in drivers/infiniband/hw/mlx5/main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

142) Use-after-free

EUVDB-ID: #VU102067

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53227

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the bfad_init() function in drivers/scsi/bfa/bfad.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

143) Infinite loop

EUVDB-ID: #VU102217

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53229

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the rxe_requester() function in drivers/infiniband/sw/rxe/rxe_req.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

144) NULL pointer dereference

EUVDB-ID: #VU102143

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53230

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the cppc_get_cpu_cost() function in drivers/cpufreq/cppc_cpufreq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

145) NULL pointer dereference

EUVDB-ID: #VU102144

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53231

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the cppc_get_cpu_power() function in drivers/cpufreq/cppc_cpufreq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

146) Use-after-free

EUVDB-ID: #VU102068

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53232

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the calc_rtx(), s390_domain_free(), s390_iommu_attach_device(), s390_iommu_probe_device(), s390_iommu_unmap_pages() and s390_iommu_init() functions in drivers/iommu/s390-iommu.c, within the pci_fmb_show() function in arch/s390/pci/pci_debug.c, within the zpci_fmb_enable_device() function in arch/s390/pci/pci.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

147) Improper error handling

EUVDB-ID: #VU102207

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53233

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the utf8_load() function in fs/unicode/utf8-core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

148) Resource management error

EUVDB-ID: #VU102251

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53234

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the z_erofs_load_compact_lcluster() and z_erofs_get_extent_decompressedlen() functions in fs/erofs/zmap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

149) Memory leak

EUVDB-ID: #VU102003

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53236

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the xsk_build_skb() function in net/xdp/xsk.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

150) Use-after-free

EUVDB-ID: #VU102069

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53237

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the __match_tty() and hci_conn_del_sysfs() functions in net/bluetooth/hci_sysfs.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

151) Use-after-free

EUVDB-ID: #VU102070

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53239

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the usb6fire_chip_abort(), usb6fire_chip_destroy(), usb6fire_chip_probe() and usb6fire_chip_disconnect() functions in sound/usb/6fire/chip.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

152) NULL pointer dereference

EUVDB-ID: #VU101818

Risk: Medium

CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2024-53240

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote backend to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the guest xen-netfront driver. A a malicious network backend can crash the guest OS.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

153) Processor optimization removal or modification of security-critical code

EUVDB-ID: #VU101817

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53241

CWE-ID: CWE-1037 - Processor optimization removal or modification of security-critical code

Exploit availability: No

Description

The vulnerability allows a malicious guest to gain access to sensitive information.

The vulnerability exists due to implemented mitigations for hardware vulnerabilities related to Xen hypercall page implementation the guest OS is relying on to work might not be fully functional, resulting in e.g. guest user processes being able to read data they ought not have access to.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

154) Improper locking

EUVDB-ID: #VU102945

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53685

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the fs/ceph/mds_client.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

155) Integer underflow

EUVDB-ID: #VU102965

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53690

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer underflow within the nilfs_lookup() function in fs/nilfs2/namei.c, within the nilfs_iget() function in fs/nilfs2/inode.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

156) Use-after-free

EUVDB-ID: #VU102916

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-54680

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error within the clean_demultiplex_info(), cifs_get_tcp_session(), cifs_crypto_secmech_release(), cifs_put_tcp_session() and generic_ip_connect() functions in fs/smb/client/connect.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

157) Input validation error

EUVDB-ID: #VU102991

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-55639

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the rswitch_device_alloc(), of_node_put() and rswitch_device_free() functions in drivers/net/ethernet/renesas/rswitch.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

158) Resource management error

EUVDB-ID: #VU102984

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-55881

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the complete_hypercall_exit() function in arch/x86/kvm/x86.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

159) NULL pointer dereference

EUVDB-ID: #VU102929

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-55916

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the util_probe() function in drivers/hv/hv_util.c, within the hv_vss_init() function in drivers/hv/hv_snapshot.c, within the hv_kvp_init() function in drivers/hv/hv_kvp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

160) Division by zero

EUVDB-ID: #VU102970

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56369

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the EXPORT_SYMBOL() and drm_mode_vrefresh() functions in drivers/gpu/drm/drm_modes.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

161) Improper error handling

EUVDB-ID: #VU102959

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56372

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the tun_napi_alloc_frags() function in drivers/net/tun.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

162) Improper locking

EUVDB-ID: #VU102180

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56531

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the snd_usb_caiaq_input_free() function in sound/usb/caiaq/input.c, within the setup_card(), init_card() and snd_disconnect() functions in sound/usb/caiaq/device.c, within the snd_usb_caiaq_audio_init() function in sound/usb/caiaq/audio.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

163) Improper locking

EUVDB-ID: #VU102181

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56532

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the snd_us122l_disconnect() function in sound/usb/usx2y/us122l.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

164) Improper locking

EUVDB-ID: #VU102182

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56533

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the snd_usx2y_disconnect() function in sound/usb/usx2y/usbusx2y.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

165) NULL pointer dereference

EUVDB-ID: #VU102148

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56536

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the cw1200_spi_suspend() function in drivers/net/wireless/st/cw1200/cw1200_spi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

166) Use-after-free

EUVDB-ID: #VU102071

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56538

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the zynqmp_dpsub_drm_cleanup() function in drivers/gpu/drm/xlnx/zynqmp_kms.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

167) Buffer overflow

EUVDB-ID: #VU102236

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56539

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the drivers/net/wireless/marvell/mwifiex/fw.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

168) Resource management error

EUVDB-ID: #VU102252

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56543

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the ath12k_mac_peer_cleanup_all() function in drivers/net/wireless/ath/ath12k/mac.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

169) Use-after-free

EUVDB-ID: #VU102074

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56546

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the xlnx_add_cb_for_suspend() function in drivers/soc/xilinx/xlnx_event_manager.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

170) Use-after-free

EUVDB-ID: #VU102075

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56548

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the hfsplus_read_wrapper() function in fs/hfsplus/wrapper.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

171) NULL pointer dereference

EUVDB-ID: #VU102151

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56549

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the cachefiles_ondemand_fd_write_iter() and cachefiles_ondemand_fd_llseek() functions in fs/cachefiles/ondemand.c, within the cachefiles_commit_object() and cachefiles_clean_up_object() functions in fs/cachefiles/interface.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

172) Use-after-free

EUVDB-ID: #VU102039

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56551

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the amdgpu_vce_sw_fini() function in drivers/gpu/drm/amd/amdgpu/amdgpu_vce.c, within the amdgpu_device_fini_sw() function in drivers/gpu/drm/amd/amdgpu/amdgpu_device.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

173) Buffer overflow

EUVDB-ID: #VU102213

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56557

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the __aligned() function in drivers/iio/adc/ad7923.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

174) Use-after-free

EUVDB-ID: #VU102042

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56558

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the e_show() function in fs/nfsd/export.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

175) Input validation error

EUVDB-ID: #VU102279

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56562

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the i3c_master_put_i3c_addrs() function in drivers/i3c/master.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

176) Improper locking

EUVDB-ID: #VU102170

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56566

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the check_slab(), slab_fix() and alloc_single_from_partial() functions in mm/slub.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

177) Division by zero

EUVDB-ID: #VU102216

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56567

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the ad7780_write_raw() function in drivers/iio/adc/ad7780.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

178) NULL pointer dereference

EUVDB-ID: #VU102127

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56568

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the arm_smmu_probe_device() function in drivers/iommu/arm/arm-smmu/arm-smmu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

179) NULL pointer dereference

EUVDB-ID: #VU102126

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56569

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ftrace_mod_callback() function in kernel/trace/ftrace.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

180) Input validation error

EUVDB-ID: #VU102280

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56570

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ovl_dentry_init_flags() function in fs/overlayfs/util.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

181) Resource management error

EUVDB-ID: #VU102230

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56571

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the uvc_alloc_entity(), uvc_parse_vendor_control(), uvc_parse_standard_control() and uvc_gpio_parse() functions in drivers/media/usb/uvc/uvc_driver.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

182) Memory leak

EUVDB-ID: #VU101996

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56572

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the allocate_buffers_internal() function in drivers/media/platform/allegro-dvt/allegro-core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

183) Double free

EUVDB-ID: #VU102193

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56573

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the efi_handle_cmdline() function in drivers/firmware/efi/libstub/efi-stub.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

184) NULL pointer dereference

EUVDB-ID: #VU102125

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56574

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ts2020_regmap_unlock() function in drivers/media/dvb-frontends/ts2020.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

185) NULL pointer dereference

EUVDB-ID: #VU102124

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56575

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mxc_jpeg_detach_pm_domains() function in drivers/media/platform/nxp/imx-jpeg/mxc-jpeg.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

186) Resource management error

EUVDB-ID: #VU102229

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56576

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the tc358743_probe() function in drivers/media/i2c/tc358743.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

187) NULL pointer dereference

EUVDB-ID: #VU102123

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56577

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mtk_jpegdec_hw_init_irq() and mtk_jpegdec_hw_probe() functions in drivers/media/platform/mediatek/jpeg/mtk_jpeg_dec_hw.c, within the mtk_jpeg_single_core_init() and mtk_jpeg_probe() functions in drivers/media/platform/mediatek/jpeg/mtk_jpeg_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

188) Improper error handling

EUVDB-ID: #VU102206

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56578

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the mxc_jpeg_probe() function in drivers/media/platform/nxp/imx-jpeg/mxc-jpeg.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

189) Use-after-free

EUVDB-ID: #VU102045

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56582

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the btrfs_encoded_read_endio() function in fs/btrfs/inode.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

190) Use-after-free

EUVDB-ID: #VU102038

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56584

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the io_init_wq_offload() function in io_uring/tctx.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

191) NULL pointer dereference

EUVDB-ID: #VU102104

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56587

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the brightness_show() and max_brightness_show() functions in drivers/leds/led-class.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

192) NULL pointer dereference

EUVDB-ID: #VU102106

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56588

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the debugfs_to_reg_name_v3_hw(), debugfs_global_v3_hw_show(), debugfs_axi_v3_hw_show(), debugfs_ras_v3_hw_show(), debugfs_port_v3_hw_show(), debugfs_cq_v3_hw_show(), debugfs_dq_show_slot_v3_hw(), debugfs_iost_v3_hw_show(), debugfs_iost_cache_v3_hw_show(), debugfs_itct_v3_hw_show(), debugfs_itct_cache_v3_hw_show(), debugfs_create_files_v3_hw(), debugfs_release_v3_hw(), debugfs_snapshot_regs_v3_hw(), debugfs_bist_init_v3_hw() and debugfs_init_v3_hw() functions in drivers/scsi/hisi_sas/hisi_sas_v3_hw.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

193) Improper locking

EUVDB-ID: #VU102168

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56589

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the cq_thread_v3_hw() function in drivers/scsi/hisi_sas/hisi_sas_v3_hw.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

194) Input validation error

EUVDB-ID: #VU102281

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56590

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the hci_tx_work() and hci_acldata_packet() functions in net/bluetooth/hci_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

195) NULL pointer dereference

EUVDB-ID: #VU102107

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56593

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the brcmf_sdiod_sgtable_alloc() function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/bcmsdh.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

196) Improper locking

EUVDB-ID: #VU102160

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56594

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the amdgpu_ttm_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_ttm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

197) Out-of-bounds read

EUVDB-ID: #VU102088

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56595

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the dbAdjTree() function in fs/jfs/jfs_dmap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

198) Out-of-bounds read

EUVDB-ID: #VU102087

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56596

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the jfs_readdir() function in fs/jfs/jfs_dtree.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

199) Out-of-bounds read

EUVDB-ID: #VU102086

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56597

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the dbAllocCtl() function in fs/jfs/jfs_dmap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

200) Out-of-bounds read

EUVDB-ID: #VU102085

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56598

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the dtReadFirst() function in fs/jfs/jfs_dtree.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

201) NULL pointer dereference

EUVDB-ID: #VU102108

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56599

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ath10k_sdio_remove() function in drivers/net/wireless/ath/ath10k/sdio.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

202) Security features bypass

EUVDB-ID: #VU103509

Risk: High

CVSSv4.0: 6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:H/E:U/U:Amber]

CVE-ID: CVE-2024-5660

CWE-ID: CWE-254 - Security Features

Exploit availability: No

Description

The vulnerability allows a malicious guest to compromise the hypervisor.

The vulnerability exists due to incorrect memory address translation when Hardware Page Aggregation (HPA) is enabled and Stage-1 and/or Stage-2 translation is enabled for the active translation regime. A malicious guest can bypass Stage-2 translation and/or GPT protection and compromise the host in certain hypervisor environments.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

203) Use-after-free

EUVDB-ID: #VU102017

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56602

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ieee802154_create() function in net/ieee802154/socket.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

204) Use-after-free

EUVDB-ID: #VU102018

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56603

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the can_create() function in net/can/af_can.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

205) Use-after-free

EUVDB-ID: #VU102019

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56604

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the rfcomm_sock_alloc() function in net/bluetooth/rfcomm/sock.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

206) Use-after-free

EUVDB-ID: #VU102020

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56605

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the l2cap_sock_alloc() function in net/bluetooth/l2cap_sock.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

207) Use-after-free

EUVDB-ID: #VU102021

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56606

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the packet_create() function in net/packet/af_packet.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

208) Improper locking

EUVDB-ID: #VU102166

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56607

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ath12k_mac_op_set_bitrate_mask() function in drivers/net/wireless/ath/ath12k/mac.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

209) Improper locking

EUVDB-ID: #VU102165

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56609

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the rtw_usb_tx_handler() and rtw_usb_deinit_tx() functions in drivers/net/wireless/realtek/rtw88/usb.c, within the rtw_sdio_deinit_tx() function in drivers/net/wireless/realtek/rtw88/sdio.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

210) NULL pointer dereference

EUVDB-ID: #VU102109

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56611

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the migrate_to_node() function in mm/mempolicy.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

211) Out-of-bounds read

EUVDB-ID: #VU102084

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56614

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the xsk_map_delete_elem() function in net/xdp/xskmap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

212) Out-of-bounds read

EUVDB-ID: #VU102083

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56615

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the dev_map_alloc(), dev_map_delete_elem() and dev_map_hash_delete_elem() functions in kernel/bpf/devmap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

213) Out-of-bounds read

EUVDB-ID: #VU102082

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56616

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the drm_dp_decode_sideband_msg_hdr() function in drivers/gpu/drm/display/drm_dp_mst_topology.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

214) NULL pointer dereference

EUVDB-ID: #VU102111

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56617

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the last_level_cache_is_valid(), populate_cache_leaves() and init_level_allocate_ci() functions in drivers/base/cacheinfo.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

215) Use-after-free

EUVDB-ID: #VU102022

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56619

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the nilfs_put_page() function in fs/nilfs2/dir.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

216) NULL pointer dereference

EUVDB-ID: #VU102112

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56620

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ufs_qcom_probe() function in drivers/ufs/host/ufs-qcom.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

217) Input validation error

EUVDB-ID: #VU102283

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56622

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the read_req_latency_avg_show() and write_req_latency_avg_show() functions in drivers/ufs/core/ufs-sysfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

218) Use-after-free

EUVDB-ID: #VU102023

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56623

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the qla2x00_do_dpc() function in drivers/scsi/qla2xxx/qla_os.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

219) Resource management error

EUVDB-ID: #VU102244

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56625

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the can_set_termination() function in drivers/net/can/dev/dev.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

220) NULL pointer dereference

EUVDB-ID: #VU102114

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56629

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the wacom_update_name() function in drivers/hid/wacom_sys.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

221) Improper error handling

EUVDB-ID: #VU102203

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56630

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the ocfs2_get_init_inode() function in fs/ocfs2/namei.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

222) Use-after-free

EUVDB-ID: #VU102024

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56631

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the sg_release() function in drivers/scsi/sg.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

223) Memory leak

EUVDB-ID: #VU101993

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56632

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the nvme_stop_keep_alive() function in drivers/nvme/host/tcp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

224) NULL pointer dereference

EUVDB-ID: #VU102115

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56634

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the grgpio_probe() function in drivers/gpio/gpio-grgpio.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

225) Use-after-free

EUVDB-ID: #VU102026

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56635

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the default_operstate() function in net/core/link_watch.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

226) Resource management error

EUVDB-ID: #VU102245

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56636

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the geneve_xmit_skb() function in drivers/net/geneve.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

227) Race condition

EUVDB-ID: #VU102219

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56637

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the find_set_type() function in net/netfilter/ipset/ip_set_core.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

228) Resource management error

EUVDB-ID: #VU102228

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56641

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the smc_sk_init(), smc_connect_rdma(), smc_connect_ism() and smc_listen_work() functions in net/smc/af_smc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

229) Use-after-free

EUVDB-ID: #VU102029

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56642

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cleanup_bearer() function in net/tipc/udp_media.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

230) Memory leak

EUVDB-ID: #VU101989

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56643

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the dccp_feat_change_recv() function in net/dccp/feat.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

231) Memory leak

EUVDB-ID: #VU101992

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56644

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ip6_negative_advice() function in net/ipv6/route.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

232) Integer underflow

EUVDB-ID: #VU102210

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56645

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer underflow within the j1939_session_new() function in net/can/j1939/transport.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

233) Out-of-bounds read

EUVDB-ID: #VU102079

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56648

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the fill_frame_info() function in net/hsr/hsr_forward.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

234) NULL pointer dereference

EUVDB-ID: #VU102117

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56649

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the EXPORT_SYMBOL_GPL() function in drivers/net/ethernet/freescale/enetc/enetc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

235) Use-after-free

EUVDB-ID: #VU102030

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56651

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the hi3110_can_ist() function in drivers/net/can/spi/hi311x.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

236) Incorrect calculation

EUVDB-ID: #VU102257

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56654

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the hci_le_create_big_complete_evt() function in net/bluetooth/hci_event.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

237) Improper error handling

EUVDB-ID: #VU102202

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56656

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the drivers/net/ethernet/broadcom/bnxt/bnxt.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

238) Improper error handling

EUVDB-ID: #VU102201

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56659

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the include/net/lapb.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

239) NULL pointer dereference

EUVDB-ID: #VU102118

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56660

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the dr_domain_add_vport_cap() function in drivers/net/ethernet/mellanox/mlx5/core/steering/sws/dr_domain.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

240) NULL pointer dereference

EUVDB-ID: #VU102119

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56661

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the cleanup_bearer() function in net/tipc/udp_media.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

241) Out-of-bounds read

EUVDB-ID: #VU102077

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56662

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the acpi_nfit_ctl() function in drivers/acpi/nfit/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

242) Input validation error

EUVDB-ID: #VU102187

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56663

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the NLA_POLICY_NESTED_ARRAY() function in net/wireless/nl80211.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

243) Use-after-free

EUVDB-ID: #VU102034

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56664

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the sock_map_lookup_sys() function in net/core/sock_map.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

244) NULL pointer dereference

EUVDB-ID: #VU102121

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56667

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the capture_engine() function in drivers/gpu/drm/i915/i915_gpu_error.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

245) NULL pointer dereference

EUVDB-ID: #VU102122

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56670

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the gs_start_io() function in drivers/usb/gadget/function/u_serial.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

246) Use-after-free

EUVDB-ID: #VU102035

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56672

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the blkcg_unpin_online() function in block/blk-cgroup.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

247) Use-after-free

EUVDB-ID: #VU102036

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56675

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the perf_event_detach_bpf_prog() function in kernel/trace/bpf_trace.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

248) Use-after-free

EUVDB-ID: #VU102010

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56677

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the setup_arch() function in arch/powerpc/kernel/setup-common.c, within the fadump_cma_init() and fadump_reserve_mem() functions in arch/powerpc/kernel/fadump.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

249) Use-after-free

EUVDB-ID: #VU102012

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56678

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ___do_page_fault() function in arch/powerpc/mm/fault.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

250) Improper error handling

EUVDB-ID: #VU102198

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56681

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the ahash_hmac_setkey() and ahash_hmac_init() functions in drivers/crypto/bcm/cipher.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

251) Input validation error

EUVDB-ID: #VU102276

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56683

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the vc4_hdmi_debugfs_regs() function in drivers/gpu/drm/vc4/vc4_hdmi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

252) Improper locking

EUVDB-ID: #VU102156

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56687

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the musb_free_request() function in drivers/usb/musb/musb_gadget.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

253) NULL pointer dereference

EUVDB-ID: #VU102096

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56688

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the xs_sock_reset_state_flags() function in net/sunrpc/xprtsock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

254) Input validation error

EUVDB-ID: #VU102261

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56690

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the pcrypt_aead_encrypt() and pcrypt_aead_decrypt() functions in crypto/pcrypt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

255) Resource management error

EUVDB-ID: #VU102226

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56691

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the wcove_typec_probe() function in drivers/usb/typec/tcpm/wcove.c, within the ARRAY_SIZE(), bxtwc_add_chained_irq_chip() and bxtwc_probe() functions in drivers/mfd/intel_soc_pmic_bxtwc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

256) Improper locking

EUVDB-ID: #VU102157

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56694

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the sk_psock_strp_data_ready() function in net/core/skmsg.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

257) NULL pointer dereference

EUVDB-ID: #VU102101

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56698

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the dwc3_prepare_trbs_sg() function in drivers/usb/dwc3/gadget.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

258) NULL pointer dereference

EUVDB-ID: #VU102102

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56700

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the fmc_send_cmd() function in drivers/media/radio/wl128x/fmdrv_common.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

259) Improper locking

EUVDB-ID: #VU102158

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56701

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the dtl_worker_enable() and dtl_worker_disable() functions in arch/powerpc/platforms/pseries/lpar.c, within the dtl_enable() and dtl_disable() functions in arch/powerpc/platforms/pseries/dtl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

260) Double free

EUVDB-ID: #VU102192

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56704

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the xen_9pfs_front_free() function in net/9p/trans_xen.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

261) Reachable assertion

EUVDB-ID: #VU102190

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56705

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to reachable assertion within the ia_css_3a_statistics_allocate() function in drivers/staging/media/atomisp/pci/sh_css_params.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

262) Buffer overflow

EUVDB-ID: #VU102237

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56708

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the igen6_register_mci() and igen6_unregister_mcis() functions in drivers/edac/igen6_edac.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

263) Improper locking

EUVDB-ID: #VU102155

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56709

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the io_queue_iowq() function in io_uring/io_uring.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

264) Memory leak

EUVDB-ID: #VU101987

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56712

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the check_memfd_seals(), export_udmabuf() and udmabuf_create() functions in drivers/dma-buf/udmabuf.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

265) Incorrect calculation

EUVDB-ID: #VU102256

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56716

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the nsim_dev_health_break_write() function in drivers/net/netdevsim/health.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

266) Input validation error

EUVDB-ID: #VU102268

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56722

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the free_srqc() function in drivers/infiniband/hw/hns/hns_roce_srq.c, within the hns_roce_mr_free() function in drivers/infiniband/hw/hns/hns_roce_mr.c, within the set_rwqe_data_seg(), free_mr_modify_rsv_qp(), free_mr_post_send_lp_wqe(), free_mr_send_cmd_to_hw(), hns_roce_v2_set_abs_fields(), hns_roce_v2_modify_qp(), hns_roce_v2_query_qp(), hns_roce_v2_destroy_qp_common(), hns_roce_v2_destroy_qp(), hns_roce_v2_modify_cq() and hns_roce_v2_query_cqc() functions in drivers/infiniband/hw/hns/hns_roce_hw_v2.c, within the hns_roce_table_put() function in drivers/infiniband/hw/hns/hns_roce_hem.c, within the free_cqc() function in drivers/infiniband/hw/hns/hns_roce_cq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

267) Resource management error

EUVDB-ID: #VU102225

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56723

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the ARRAY_SIZE() and bxtwc_probe() functions in drivers/mfd/intel_soc_pmic_bxtwc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

268) Resource management error

EUVDB-ID: #VU102224

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56724

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the bxt_wcove_tmu_irq_handler() and bxt_wcove_tmu_probe() functions in drivers/platform/x86/intel/bxtwc_tmu.c, within the ARRAY_SIZE() and bxtwc_probe() functions in drivers/mfd/intel_soc_pmic_bxtwc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

269) Memory leak

EUVDB-ID: #VU101985

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56729

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the spin_lock() function in fs/smb/client/cached_dir.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

270) Improper locking

EUVDB-ID: #VU102154

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56739

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the rtc_timer_do_work() function in drivers/rtc/interface.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

271) Memory leak

EUVDB-ID: #VU101984

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56741

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the policy_unpack_test_unpack_strdup_with_null_name(), policy_unpack_test_unpack_strdup_with_name() and policy_unpack_test_unpack_strdup_out_of_bounds() functions in security/apparmor/policy_unpack_test.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

272) Memory leak

EUVDB-ID: #VU101982

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56745

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the reset_method_store() function in drivers/pci/pci.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

273) Memory leak

EUVDB-ID: #VU101981

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56746

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the sh7760fb_alloc_mem() function in drivers/video/fbdev/sh7760fb.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

274) Memory leak

EUVDB-ID: #VU101980

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56747

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the qedi_alloc_and_init_sb() function in drivers/scsi/qedi/qedi_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

275) Memory leak

EUVDB-ID: #VU101979

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56748

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the qedf_alloc_and_init_sb() function in drivers/scsi/qedf/qedf_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

276) Resource management error

EUVDB-ID: #VU102241

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56752

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the gf100_gr_chan_new() function in drivers/gpu/drm/nouveau/nvkm/engine/gr/gf100.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

277) Input validation error

EUVDB-ID: #VU102273

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56754

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the caam_qi_init() function in drivers/crypto/caam/qi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

278) Input validation error

EUVDB-ID: #VU102265

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56755

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the fs/netfs/fscache_volume.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

279) Use-after-free

EUVDB-ID: #VU102008

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56756

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the nvme_free_host_mem(), __nvme_alloc_host_mem() and kfree() functions in drivers/nvme/host/pci.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

280) Use-after-free

EUVDB-ID: #VU102393

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56759

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the btrfs_force_cow_block() and btrfs_cow_block() functions in fs/btrfs/ctree.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

281) Resource management error

EUVDB-ID: #VU102403

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56760

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the __pci_enable_msi_range() function in drivers/pci/msi/msi.c, within the pci_msi_domain_supports() function in drivers/pci/msi/irqdomain.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

282) Use-after-free

EUVDB-ID: #VU102396

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56765

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the vas_mmap_fault() function in arch/powerpc/platforms/book3s/vas-api.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

283) Double free

EUVDB-ID: #VU102400

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56766

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the atmel_pmecc_create_user() function in drivers/mtd/nand/raw/atmel/pmecc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

284) Use-after-free

EUVDB-ID: #VU102397

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56767

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the at_xdmac_prep_dma_memset() function in drivers/dma/at_xdmac.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

285) Improper error handling

EUVDB-ID: #VU102401

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56769

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the MODULE_PARM_DESC() function in drivers/media/dvb-frontends/dib3000mb.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

286) NULL pointer dereference

EUVDB-ID: #VU102483

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56774

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the btrfs_search_slot() function in fs/btrfs/ctree.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

287) Memory leak

EUVDB-ID: #VU102476

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56775

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the restore_planes_and_stream_state() function in drivers/gpu/drm/amd/display/dc/core/dc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

288) NULL pointer dereference

EUVDB-ID: #VU102484

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56776

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the sti_cursor_atomic_check() function in drivers/gpu/drm/sti/sti_cursor.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

289) NULL pointer dereference

EUVDB-ID: #VU102485

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56777

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the sti_gdp_atomic_check() function in drivers/gpu/drm/sti/sti_gdp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

290) NULL pointer dereference

EUVDB-ID: #VU102486

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56778

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the sti_hqvdp_atomic_check() function in drivers/gpu/drm/sti/sti_hqvdp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

291) Memory leak

EUVDB-ID: #VU102477

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56779

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the release_open_stateid(), spin_lock() and nfsd4_process_open2() functions in fs/nfsd/nfs4state.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

292) Improper locking

EUVDB-ID: #VU102489

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56780

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the dquot_writeback_dquots() function in fs/quota/dquot.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

293) Resource management error

EUVDB-ID: #VU102495

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56787

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the imx8mq_soc_revision_from_atf(), imx8mq_soc_revision(), imx8mm_soc_uid(), kasprintf(), imx8_soc_init() and kfree() functions in drivers/soc/imx/soc-imx8m.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

294) Input validation error

EUVDB-ID: #VU102990

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57791

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the smc_clc_wait_msg() function in net/smc/smc_clc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

295) Buffer overflow

EUVDB-ID: #VU102978

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57792

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the set_charge_current_limit() function in drivers/power/supply/gpio-charger.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

296) Memory leak

EUVDB-ID: #VU102902

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57793

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the alloc_quote_buf() function in drivers/virt/coco/tdx-guest/tdx-guest.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

297) Use-after-free

EUVDB-ID: #VU102906

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57795

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the rxe_query_port(), rxe_enable_driver(), INIT_RDMA_OBJ_SIZE() and rxe_register_device() functions in drivers/infiniband/sw/rxe/rxe_verbs.c, within the rxe_parent_name(), rxe_net_add() and rxe_port_down() functions in drivers/infiniband/sw/rxe/rxe_net.c, within the rxe_mcast_add() function in drivers/infiniband/sw/rxe/rxe_mcast.c, within the rxe_dealloc(), rxe_init_device_param(), rxe_init_port_param() and rxe_set_mtu() functions in drivers/infiniband/sw/rxe/rxe.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

298) Use-after-free

EUVDB-ID: #VU102915

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57798

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the drm_dp_mst_up_req_work() and drm_dp_mst_handle_up_req() functions in drivers/gpu/drm/display/drm_dp_mst_topology.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

299) Use-after-free

EUVDB-ID: #VU102908

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57801

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mlx5_esw_for_each_rep() function in drivers/net/ethernet/mellanox/mlx5/core/eswitch_offloads.c, within the mlx5_esw_ipsec_restore_dest_uplink() function in drivers/net/ethernet/mellanox/mlx5/core/esw/ipsec_fs.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

300) Buffer overflow

EUVDB-ID: #VU102976

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57804

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the mpi3mr_read_tsu_interval(), mpi3mr_free_mem(), mpi3mr_free_config_dma_memory() and mpi3mr_process_cfg_req() functions in drivers/scsi/mpi3mr/mpi3mr_fw.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

301) Improper error handling

EUVDB-ID: #VU102957

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57809

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the IMX_PCIE_FLAG_HAS_SERDES BIT(), imx_pcie_suspend_noirq() and imx_pcie_resume_noirq() functions in drivers/pci/controller/dwc/pci-imx6.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

302) Improper error handling

EUVDB-ID: #VU102958

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57838

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the arch_init_kprobes() function in arch/s390/kernel/kprobes.c, within the SYM_CODE_START() function in arch/s390/kernel/entry.S. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

303) Use-after-free

EUVDB-ID: #VU102912

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57849

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cpumsf_pmu_stop() function in arch/s390/kernel/perf_cpum_sf.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

304) Buffer overflow

EUVDB-ID: #VU102968

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57850

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the jffs2_rtime_decompress() function in fs/jffs2/compr_rtime.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

305) Use-after-free

EUVDB-ID: #VU102910

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57857

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the siw_query_device(), siw_query_port() and siw_query_qp() functions in drivers/infiniband/sw/siw/siw_verbs.c, within the siw_device_create(), siw_netdev_event() and siw_newlink() functions in drivers/infiniband/sw/siw/siw_main.c, within the siw_create_listen() and siw_cep_set_free_and_put() functions in drivers/infiniband/sw/siw/siw_cm.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

306) Memory leak

EUVDB-ID: #VU102897

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57874

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the tagged_addr_ctrl_get() and tagged_addr_ctrl_set() functions in arch/arm64/kernel/ptrace.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

307) Improper locking

EUVDB-ID: #VU102936

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57876

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the drm_dp_mst_topology_mgr_set_mst(), EXPORT_SYMBOL(), update_msg_rx_state() and drm_dp_mst_hpd_irq_handle_event() functions in drivers/gpu/drm/display/drm_dp_mst_topology.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

308) Use-after-free

EUVDB-ID: #VU102907

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57887

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the adv7533_parse_dt() function in drivers/gpu/drm/bridge/adv7511/adv7533.c, within the adv7511_probe(), i2c_unregister_device() and adv7511_remove() functions in drivers/gpu/drm/bridge/adv7511/adv7511_drv.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

309) Buffer overflow

EUVDB-ID: #VU102977

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57888

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the workqueue_softirq_dead(), __flush_workqueue() and start_flush_work() functions in kernel/workqueue.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

310) Integer overflow

EUVDB-ID: #VU102963

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57890

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the uverbs_request_next_ptr(), ib_uverbs_post_send() and ib_uverbs_unmarshall_recv() functions in drivers/infiniband/core/uverbs_cmd.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

311) Use-after-free

EUVDB-ID: #VU102905

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57892

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the brelse() function in fs/ocfs2/quota_local.c, within the ocfs2_get_next_id() function in fs/ocfs2/quota_global.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

312) Out-of-bounds read

EUVDB-ID: #VU102918

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57893

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the DEFINE_SPINLOCK() and snd_seq_oss_synth_sysex() functions in sound/core/seq/oss/seq_oss_synth.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

313) Use-after-free

EUVDB-ID: #VU102904

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57896

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the close_ctree() function in fs/btrfs/disk-io.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

314) Improper locking

EUVDB-ID: #VU102932

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57897

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the svm_migrate_copy_to_vram() and svm_migrate_copy_to_ram() functions in drivers/gpu/drm/amd/amdkfd/kfd_migrate.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

315) Integer overflow

EUVDB-ID: #VU102964

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57899

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the ieee80211_mbss_info_change_notify() function in net/mac80211/mesh.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

316) Improper locking

EUVDB-ID: #VU102931

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57903

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the sk_setsockopt() function in net/core/sock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

317) Resource management error

EUVDB-ID: #VU103048

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57904

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the at91_ts_register() function in drivers/iio/adc/at91_adc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

318) Memory leak

EUVDB-ID: #VU103002

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57906

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ads8688_trigger_handler() function in drivers/iio/adc/ti-ads8688.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

319) Memory leak

EUVDB-ID: #VU103003

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57907

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the rockchip_saradc_trigger_handler() function in drivers/iio/adc/rockchip_saradc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

320) Memory leak

EUVDB-ID: #VU103004

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57908

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the kmx61_trigger_handler() function in drivers/iio/imu/kmx61.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

321) Memory leak

EUVDB-ID: #VU103006

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57910

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the vcnl4035_trigger_consumer_handler() function in drivers/iio/light/vcnl4035.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

322) Memory leak

EUVDB-ID: #VU103007

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57911

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the iio_simple_dummy_trigger_h() function in drivers/iio/dummy/iio_simple_dummy_buffer.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

323) Memory leak

EUVDB-ID: #VU103008

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57912

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the zpa2326_fill_sample_buffer() function in drivers/iio/pressure/zpa2326.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

324) Resource management error

EUVDB-ID: #VU103049

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57913

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the functionfs_bind() function in drivers/usb/gadget/function/f_fs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

325) NULL pointer dereference

EUVDB-ID: #VU103018

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57915

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the gserial_disconnect() function in drivers/usb/gadget/function/u_serial.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

326) Resource management error

EUVDB-ID: #VU103044

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57916

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the pci1xxxx_gpio_irq_handler() function in drivers/misc/mchp_pci1xxxx/mchp_pci1xxxx_gpio.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

327) Reachable assertion

EUVDB-ID: #VU103037

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57922

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to reachable assertion within the drivers/gpu/drm/amd/display/dc/dml/dml_inline_defs.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

328) Use-after-free

EUVDB-ID: #VU103010

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57926

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the drm_dev_put() function in drivers/gpu/drm/mediatek/mtk_drm_drv.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

329) NULL pointer dereference

EUVDB-ID: #VU103021

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57929

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the load_ablock() function in drivers/md/persistent-data/dm-array.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

330) NULL pointer dereference

EUVDB-ID: #VU103123

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57932

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the gve_xdp_xmit() function in drivers/net/ethernet/google/gve/gve_tx.c, within the gve_turndown() function in drivers/net/ethernet/google/gve/gve_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

331) NULL pointer dereference

EUVDB-ID: #VU103124

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57933

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the gve_xsk_pool_enable(), gve_xsk_pool_disable() and gve_xsk_wakeup() functions in drivers/net/ethernet/google/gve/gve_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

332) Input validation error

EUVDB-ID: #VU103143

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57935

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the put_dip_ctx_idx() function in drivers/infiniband/hw/hns/hns_roce_hw_v2.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

333) Buffer overflow

EUVDB-ID: #VU103135

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57936

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the drivers/infiniband/hw/bnxt_re/qplib_fp.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

334) Infinite loop

EUVDB-ID: #VU103134

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57940

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the exfat_readdir() function in fs/exfat/dir.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

335) Improper access control

EUVDB-ID: #VU97651

Risk: High

CVSSv4.0: 6.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2024-8805

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions within the implementation of the HID over GATT Profile. A remote attacker on the local network can bypass implemented security restrictions and execute arbitrary code on the target system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

336) Memory leak

EUVDB-ID: #VU103009

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21632

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ssp_get() function in arch/x86/kernel/fpu/regset.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

337) Resource management error

EUVDB-ID: #VU103045

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21645

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the amd_pmc_suspend_handler() function in drivers/platform/x86/amd/pmc/pmc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

338) Resource management error

EUVDB-ID: #VU103051

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21646

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the afs_deliver_yfsvl_get_cell_name() function in fs/afs/vlclient.c, within the afs_vl_get_cell_name() and yfs_check_canonical_cell_name() functions in fs/afs/vl_alias.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

339) NULL pointer dereference

EUVDB-ID: #VU103031

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21649

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the hclge_ptp_set_tx_info() function in drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_ptp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

340) Out-of-bounds read

EUVDB-ID: #VU103015

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21650

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the hclgevf_get_regs_len() and hclgevf_get_regs() functions in drivers/net/ethernet/hisilicon/hns3/hns3vf/hclgevf_regs.c, within the hclge_fetch_pf_reg() function in drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_regs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

341) Resource management error

EUVDB-ID: #VU103046

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21651

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the hclge_misc_irq_init(), hclge_init_ae_dev() and hclge_uninit_ae_dev() functions in drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

342) Use of uninitialized resource

EUVDB-ID: #VU103132

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21656

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the drivetemp_scsi_command() function in drivers/hwmon/drivetemp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

343) Improper locking

EUVDB-ID: #VU103129

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21662

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the cmd_work_handler() function in drivers/net/ethernet/mellanox/mlx5/core/cmd.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

Confidential Computing Module: 15-SP6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-source-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-devel-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-vdso-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-syms-coco: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

reiserfs-kmp-coco: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel-debuginfo: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-debugsource: before 6.4.0-15061.12.coco15sp6.1

kernel-coco-devel: before 6.4.0-15061.12.coco15sp6.1

kernel-coco_debug: before 6.4.0-15061.12.coco15sp6.1

kernel-coco: before 6.4.0-15061.12.coco15sp6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250289-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###